Cybersecurity Breaches And Issues Surrounding Online Threat Protection

eBook Download

BOOK EXCERPT:

Technology has become deeply integrated into modern society and various activities throughout everyday life. However, this increases the risk of vulnerabilities, such as hacking or system errors, among other online threats. Cybersecurity Breaches and Issues Surrounding Online Threat Protection is an essential reference source for the latest scholarly research on the various types of unauthorized access or damage to electronic data. Featuring extensive coverage across a range of relevant perspectives and topics, such as robotics, cloud computing, and electronic data diffusion, this publication is ideally designed for academicians, researchers, computer engineers, graduate students, and practitioners seeking current research on the threats that exist in the world of technology.

Product Details :

Genre : Computers
Author : Moore, Michelle
Publisher : IGI Global
Release : 2016-12-12
File : 430 Pages
ISBN-13 : 9781522519423


Hci Challenges And Privacy Preservation In Big Data Security

eBook Download

BOOK EXCERPT:

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Product Details :

Genre : Computers
Author : Lopez, Daphne
Publisher : IGI Global
Release : 2017-08-10
File : 293 Pages
ISBN-13 : 9781522528647


Cyber Security And Threats Concepts Methodologies Tools And Applications

eBook Download

BOOK EXCERPT:

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Product Details :

Genre : Computers
Author : Management Association, Information Resources
Publisher : IGI Global
Release : 2018-05-04
File : 1743 Pages
ISBN-13 : 9781522556350


Detecting And Mitigating Robotic Cyber Security Risks

eBook Download

BOOK EXCERPT:

Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.

Product Details :

Genre : Technology & Engineering
Author : Kumar, Raghavendra
Publisher : IGI Global
Release : 2017-03-20
File : 384 Pages
ISBN-13 : 9781522521556


Modern Principles Practices And Algorithms For Cloud Security

eBook Download

BOOK EXCERPT:

In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.

Product Details :

Genre : Computers
Author : Gupta, Brij B.
Publisher : IGI Global
Release : 2019-09-27
File : 344 Pages
ISBN-13 : 9781799810841


Cybersecurity Education For Awareness And Compliance

eBook Download

BOOK EXCERPT:

Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.

Product Details :

Genre : Education
Author : Vasileiou, Ismini
Publisher : IGI Global
Release : 2019-02-22
File : 329 Pages
ISBN-13 : 9781522578482


Applications Of Machine Learning And Deep Learning For Privacy And Cybersecurity

eBook Download

BOOK EXCERPT:

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Product Details :

Genre : Computers
Author : Lobo, Victor
Publisher : IGI Global
Release : 2022-06-24
File : 292 Pages
ISBN-13 : 9781799894322


Applications Of Encryption And Watermarking For Information Security

eBook Download

BOOK EXCERPT:

In recent years, media digitalization has been booming. It has, however, led to a phenomenon of private data hacking, which was stimulated by the expansion of the data exchange system. These hackers are being countered by using new techniques, including cryptography and watermarking. Therefore, in the fields of information security, data encryption, and watermarking, there exists a need for a collection of original research in this area. Applications of Encryption and Watermarking for Information Security provides relevant theoretical frameworks and the latest empirical research findings in the domains of security and privacy. It is written for professionals who want to improve their understanding of the strategic role of trust at different levels of information security, that is, trust at the level of cryptography and watermarking and at the level of securing multimedia data. Covering topics such as background subtraction, moving object detection, and visual watermark identification, this premier reference source is an excellent resource for security and privacy professionals, IT managers, practitioners, students and educators of higher education, librarians, researchers, and academicians.

Product Details :

Genre : Computers
Author : Mohamed, Boussif
Publisher : IGI Global
Release : 2023-03-27
File : 262 Pages
ISBN-13 : 9781668449479


Applying Methods Of Scientific Inquiry Into Intelligence Security And Counterterrorism

eBook Download

BOOK EXCERPT:

Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.

Product Details :

Genre : Computers
Author : Sari, Arif
Publisher : IGI Global
Release : 2019-05-31
File : 412 Pages
ISBN-13 : 9781522589785


Detection And Mitigation Of Insider Attacks In A Cloud Infrastructure Emerging Research And Opportunities

eBook Download

BOOK EXCERPT:

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Companies look to store their data in a separate location, distancing the availability of the information and reducing the risk of data breaches. Modern organizations need to remain vigilant against insider attacks, cloud computing risks, and security flaws within their mainframe. Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities is an essential reference source that discusses maintaining a secure management of sensitive data, and intellectual property and provides a robust security algorithm on consumer data. Featuring research on topics such as public cryptography, security principles, and trustworthy computing, this book is ideally designed for IT professionals, business managers, researchers, students, and professionals seeking coverage on preventing and detecting the insider attacks using trusted cloud computing techniques.

Product Details :

Genre : Computers
Author : Gunasekhar, T.
Publisher : IGI Global
Release : 2019-02-15
File : 149 Pages
ISBN-13 : 9781522579250