You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape. This book offers a comprehensive exploration of how agile methodologies can be integrated into cybersecurity practices to address both current challenges and anticipate future threats. Through a blend of theoretical insights and practical applications, it equips professionals with the tools necessary to develop proactive security strategies that are robust, flexible, and effective. The key features of the book below highlight these innovative approaches. · Integration of a...
This book gathers the proceedings of the International conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies, held on May 10–11, 2022, in Riyadh, Saudi Arabia. The conference organized by the College of Computer Science of Prince Sultan University, Saudi Arabia. This book provides an opportunity to account for state-of-the-art works, future trends impacting cybersecurity, cybercrimes, and smart emerging technologies, that concern to organizations and individuals, thus creating new research opportunities, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well...
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top priority in securing the use of online networks as a safe and effective platform. With the vast and diverse potential of artificial intelligence (AI) applications, it has become easier than ever to identify cyber vulnerabilities, potential threats, and the identification of solutions to these unique problems. The latest tools and technologies for AI applications have untapped potential that conventional systems and human security systems cannot meet, leading AI to be a frontrunner in the fight against malware, cyber-attacks, and various...
Computational Intelligence for Medical Internet of Things (MIoT) Applications: Machine Intelligence Applications for IoT in Healthcare explores machine intelligence techniques necessary for effective MIoT research and practice, taking a practical approach for practitioners and students entering the field. This book investigates advanced concepts and applications in the MIoT field, guiding readers through emerging developments and future trends. A wide range of international authors guide readers through advanced concepts, including deep learning, neural network, and big data analytic approaches for the classification, indexing, retrieval, analysis, and inferencing of healthcare data. - Presents the state-of-the-art in machine intelligence and related technologies and methodologies for IoT in healthcare - Discusses emerging developments and trends in machine intelligence for business and decision-making strategy in healthcare - Features new models, practical solutions, prototypes, frameworks and technological advances related to machine intelligence for MIoT applications
This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, for cybersecurity intrusion detection and monitoring, and malware analysis. Cyber-attacks have posed real and wide-ranging threats for the information society. Detecting cyber-attacks becomes a challenge, not only because of the sophistication of attacks but also because of the large scale and complex nature of today’s IT infrastructures. It discusses novel trends and achievements in machine intelligence and their role in the development of secure systems and identifies open and future research issues related to the application of machine intelligence in the cybersecurity field. Bridging an important gap between machine intelligence, big data, and cybersecurity communities, it aspires to provide a relevant reference for students, researchers, engineers, and professionals working in this area or those interested in grasping its diverse facets and exploring the latest advances on machine intelligence and big data analytics for cybersecurity applications.
The main objective of this book is to explore the synergy between cutting-edge AI technologies and environmentally conscious practices through collecting best selected research papers presented at the International Conference on Artificial Intelligence and Green Computing (ICAIGC 2023), which took place from March 15 to 17, 2023, in Beni Mellal, Morocco. Within the pages of this book, readers find a wealth of research findings, survey works, and practical experiences aimed at fostering a comprehensive understanding of the pivotal role AI plays in various fields, including agriculture, health care, IT, and more. It highlights both the opportunities presented by the widespread usage of AI and ...
This book features a selection of articles from the second edition of the conference Europe Middle East & North Africa Information Systems and Technologies to Support Learning 2018 (EMENA-ISTL'18), held in Fez, Morocco between 25th and 27th October 2018. EMENA-ISTL’18 was a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges in information systems & technologies to support learning. The main topics covered are: A) information systems technologies to support education; B) education in science, technology, engineering and Mathematics; C) emerging technologies in education learning innov...
Before the 2011 uprisings, the Middle East and North Africa were frequently seen as a uniquely undemocratic region with little civic activism. The first edition of this volume, published at the start of the Arab Spring, challenged these views by revealing a region rich with social and political mobilizations. This fully revised second edition extends the earlier explorations of Egypt, Morocco, Lebanon, Saudi Arabia, and Turkey, and adds new case studies on the uprisings in Tunisia, Syria, and Yemen. The case studies are inspired by social movement theory, but they also critique and expand the horizons of the theory's classical concepts of political opportunity structures, collective action frames, mobilization structures, and repertoires of contention based on intensive fieldwork. This strong empirical base allows for a nuanced understanding of contexts, culturally conditioned rationality, the strengths and weaknesses of local networks, and innovation in contentious action to give the reader a substantive understanding of events in the Arab world before and since 2011.
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.