Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Agile Security in the Digital Era
  • Language: en
  • Pages: 242

Agile Security in the Digital Era

  • Type: Book
  • -
  • Published: 2024-12-30
  • -
  • Publisher: CRC Press

In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a comprehensive exploration of how agile methodologies can be integrated into cybersecurity practices to address both current challenges and anticipate future threats. Through a blend of theoretical insights and practical applications, it equips professionals with the tools necessary to develop proactive security strategies that are robust, flexible, and effective. The key features of the book below highlight these innovative approaches. · Integration of a...

Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies
  • Language: en
  • Pages: 336

Advances in Cybersecurity, Cybercrimes, and Smart Emerging Technologies

This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well...

Security and Privacy Management, Techniques, and Protocols
  • Language: en
  • Pages: 448

Security and Privacy Management, Techniques, and Protocols

  • Type: Book
  • -
  • Published: 2018-04-06
  • -
  • Publisher: IGI Global

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Research Anthology on Artificial Intelligence Applications in Security
  • Language: en
  • Pages: 2301

Research Anthology on Artificial Intelligence Applications in Security

  • Type: Book
  • -
  • Published: 2020-11-27
  • -
  • Publisher: IGI Global

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various...

Computational Intelligence for Medical Internet of Things (MIoT) Applications
  • Language: en
  • Pages: 374

Computational Intelligence for Medical Internet of Things (MIoT) Applications

  • Type: Book
  • -
  • Published: 2023-01-25
  • -
  • Publisher: Elsevier

Computational Intelligence for Medical Internet of Things (MIoT) Applications: Machine Intelligence Applications for IoT in Healthcare explores machine intelligence techniques necessary for effective MIoT research and practice, taking a practical approach for practitioners and students entering the field. This book investigates advanced concepts and applications in the MIoT field, guiding readers through emerging developments and future trends. A wide range of international authors guide readers through advanced concepts, including deep learning, neural network, and big data analytic approaches for the classification, indexing, retrieval, analysis, and inferencing of healthcare data. - Presents the state-of-the-art in machine intelligence and related technologies and methodologies for IoT in healthcare - Discusses emerging developments and trends in machine intelligence for business and decision-making strategy in healthcare - Features new models, practical solutions, prototypes, frameworks and technological advances related to machine intelligence for MIoT applications

Machine Intelligence and Big Data Analytics for Cybersecurity Applications
  • Language: en
  • Pages: 533

Machine Intelligence and Big Data Analytics for Cybersecurity Applications

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.

Artificial Intelligence and Green Computing
  • Language: en
  • Pages: 311

Artificial Intelligence and Green Computing

The main objective of this book is to explore the synergy between cutting-edge AI technologies and environmentally conscious practices through collecting best selected research papers presented at the International Conference on Artificial Intelligence and Green Computing (ICAIGC 2023), which took place from March 15 to 17, 2023, in Beni Mellal, Morocco. Within the pages of this book, readers find a wealth of research findings, survey works, and practical experiences aimed at fostering a comprehensive understanding of the pivotal role AI plays in various fields, including agriculture, health care, IT, and more. It highlights both the opportunities presented by the widespread usage of AI and ...

Information Systems and Technologies to Support Learning
  • Language: en
  • Pages: 725

Information Systems and Technologies to Support Learning

  • Type: Book
  • -
  • Published: 2018-10-24
  • -
  • Publisher: Springer

This book features a selection of articles from the second edition of the conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning 2018 (EMENA-ISTL'18), held in Fez, Morocco between 25th and 27th October 2018. EMENA-ISTL’18 was a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges in information systems & technologies to support learning. The main topics covered are: A) information systems technologies to support education; B) education in science, technology, engineering and Mathematics; C) emerging technologies in education learning innov...

Social Movements, Mobilization, and Contestation in the Middle East and North Africa
  • Language: en
  • Pages: 349

Social Movements, Mobilization, and Contestation in the Middle East and North Africa

Before the 2011 uprisings, the Middle East and North Africa were frequently seen as a uniquely undemocratic region with little civic activism. The first edition of this volume, published at the start of the Arab Spring, challenged these views by revealing a region rich with social and political mobilizations. This fully revised second edition extends the earlier explorations of Egypt, Morocco, Lebanon, Saudi Arabia, and Turkey, and adds new case studies on the uprisings in Tunisia, Syria, and Yemen. The case studies are inspired by social movement theory, but they also critique and expand the horizons of the theory's classical concepts of political opportunity structures, collective action frames, mobilization structures, and repertoires of contention based on intensive fieldwork. This strong empirical base allows for a nuanced understanding of contexts, culturally conditioned rationality, the strengths and weaknesses of local networks, and innovation in contentious action to give the reader a substantive understanding of events in the Arab world before and since 2011.

Security and Privacy Management, Techniques, and Protocols
  • Language: en
  • Pages: 300

Security and Privacy Management, Techniques, and Protocols

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.