NISMO

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain an

Description: Cyber Security Using Modern Technologies by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam Estimated delivery 3-12 business days Format Hardcover Condition Brand New Description The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security. Publisher Description The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security. Author Biography Dr. Om Pal received B.E. in Computer Science & Engineering from Dr. B. R. Ambedkar University, Agra, MBA in Operation Management from IGNOU, MS (Research) in field of Cryptography from IIT Bombay and Ph.D. in field of Cryptographic Key Management from Jamia Millia Islamia, New Delhi. He has more than 19 years of Academic & Research experience in various areas of Computer Science. He is currently a Scientist-D at Ministry of Electronics and Information Technology, Government of India. He has evolved and worked on many research projects of national interest. Previously he worked at Centre for Development of Advanced Computing (C-DAC) as a Sr. Technical Officer and as an IT Resource Person in National Thermal Power Corporation (NTPC). He has published many research articles in International Journals (Transaction/SCI/Scopus) and International Conferences of repute. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He has delivered many talks on cyber security, Quantum Security and Blockchain Technology. His research interest includes Cryptography, Quantum Cryptography, Cyber Security, Blockchain Technology, Theoretical Computer Science and Cyber Laws.Dr. Vinod Kumar is presently working as Assistant Professor with the department of Electronics and Communication (Computer Science and Engineering), University of Allahabad, Prayagraj, Uttar Pradesh, India. Before joining University of Allahabad, he worked as Assistant Professor in the Department of Computer Science and Engineering, Rajkiya Engineering College (REC) Kannauj, UP, India. Prior to this, he worked as Assistant Professor in the School of Information Technology, Centre for Development of Advanced Computing (C-DAC) Noida UP India. He has received MCA from Uttar Pradesh Technical University (UPTU) Lucknow UP, India in 2005, M.Tech in Computer Science and Engineering from Guru Gobind Singh Indraprastha University (GGSIPU) Delhi in 2011, and Ph.D. in field of Cryptographic from Jamia Millia Islamia (JMI), New Delhi. He has published various quality papers in the reputed International Journals like Elsevier, Springer, Wiley, etc. He has also presented various research papers in reputed International Conferences. He has written two books for undergraduate and postgraduate students of computer science and engineering. He has a rich academics & research experience in various areas of computer science. His research interest includes cryptographic protocols, Key management in multicasting/secure group communications, and authentication protocol and security in WSNs.Dr. Rijwan Khan received his B.Tech Degree in Computer Science & Engineering from BIT, M.Tech in Computer Science & Engineering from IETE, and Ph.D.in Computer Engineering from Jamia Millia Islamia, New Delhi. He has 16 years of Academic & Research Experience in various areas of Computer Science. He is currently working as Professor and Head of Department Computer Science and Engineering at ABES Institute of Technology, Ghaziabad U.P. He is author of three subject books. He published more than 50 research papers in different journals and conferences. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He is the editor of three research books. He chaired three international conferences and was a keynote speaker in some national and international conferences.Prof. Bashir Alam received his B.Tech.(Computer Engineering) from Aligarh Muslim University (A Central University of Government of India), Aligarh, Uttar Pradesh, India, M.Tech.(IT) from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D., from Jamia Millia Islamia (A Central University of Government of India), New Delhi, India. Currently he is a Professor & Head of the Department, Department of Computer Engineering, Faculty of Engineering and Technology, Jamia Millia Islamia, New Delhi. He has published several research articles/ papers in various reputed International Journals and Conference Proceedings published by reputed publishers like Elsevier, Springer, IEEE etc. He has filed patents on Conditional Access System, Cryptographic systems. His research interests include Block chain Technology, Network Security, GPU Computing, Big Data, Parallel Computing, Soft Computing, Computer Network, Operating System, Distributed and Cloud Computing, Advanced Computer Architecture and Intellectual Property Rights. He is also reviewer for several reputed international journals and Conferences. He is a Life Time Member of ISTE (Indian Society for Technical Education) and other technical societies.Prof. Mansaf Alam has been working as a Professor in the Department of Computer Science, Faculty of Natural Sciences, Jamia Millia Islamia, New Delhi-110025, Young Faculty Research Fellow, DeitY, Govt. of India & Editor-in-Chief, Journal of Applied Information Science. He has published several research articles in reputed International Journals and Proceedings at reputed International conferences published by IEEE, Springer, Elsevier Science, and ACM. His area of research includes Artificial Intelligence, Big Data Analytics, Machine Learning & Deep Learning, Cloud Computing, and Data Mining. He is a reviewer of various journals of International repute, like Information Science, published by Elsevier Science. He is also a member of the program committee of various reputed International conferences. He is on the Editorial Board of some reputed Intentional Journals in Computer Sciences. He has published three books: Digital Logic Design by PHI, Concepts of Multimedia by Arihant, and Internet of Things: Concepts and Applications by Springer, Big Data Analytics: Applications in Business and Marketing, Big Data Analytics: Digital Marketing and Decision Making by Taylor and Francis. He recently got International Patent (Australian) on An Artificial Intelligence Based Smart Dustbin. Details ISBN 1032213191 ISBN-13 9781032213194 Title Cyber Security Using Modern Technologies Author Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam Format Hardcover Year 2023 Pages 272 Publisher Taylor & Francis Ltd GE_Item_ID:161206983; About Us Grand Eagle Retail is the ideal place for all your shopping needs! With fast shipping, low prices, friendly service and over 1,000,000 in stock items - you're bound to find what you want, at a price you'll love! Shipping & Delivery Times Shipping is FREE to any address in USA. Please view eBay estimated delivery times at the top of the listing. Deliveries are made by either USPS or Courier. We are unable to deliver faster than stated. International deliveries will take 1-6 weeks. NOTE: We are unable to offer combined shipping for multiple items purchased. This is because our items are shipped from different locations. Returns If you wish to return an item, please consult our Returns Policy as below: Please contact Customer Services and request "Return Authorisation" before you send your item back to us. Unauthorised returns will not be accepted. Returns must be postmarked within 4 business days of authorisation and must be in resellable condition. Returns are shipped at the customer's risk. We cannot take responsibility for items which are lost or damaged in transit. For purchases where a shipping charge was paid, there will be no refund of the original shipping charge. Additional Questions If you have any questions please feel free to Contact Us. Categories Baby Books Electronics Fashion Games Health & Beauty Home, Garden & Pets Movies Music Sports & Outdoors Toys

Price: 119.48 USD

Location: Fairfield, Ohio

End Time: 2024-11-09T04:50:20.000Z

Shipping Cost: 0 USD

Product Images

Cyber Security Using Modern Technologies: Artificial Intelligence, Blockchain an

Item Specifics

Restocking Fee: No

Return shipping will be paid by: Buyer

All returns accepted: Returns Accepted

Item must be returned within: 30 Days

Refund will be given as: Money Back

ISBN-13: 9781032213194

Book Title: Cyber Security Using Modern Technologies

Number of Pages: 304 Pages

Language: English

Publication Name: Cyber Security Using Modern Technologies : Artificial Intelligence, Blockchain and Quantum Cryptography

Publisher: Taylor & Francis Group

Publication Year: 2023

Subject: Mobile & Wireless Communications, Security / General, General, Security / Networking

Type: Textbook

Author: Vinod Kumar

Item Length: 10 in

Subject Area: Mathematics, Computers, Technology & Engineering

Item Width: 7 in

Format: Hardcover

Recommended

PATCH USAF 47TH CIS/OL-A CYBER SECURITY TEST FLIGHT                  B12-1
PATCH USAF 47TH CIS/OL-A CYBER SECURITY TEST FLIGHT B12-1

$6.75

View Details
10 Cyber Security Windows server Textbook Lot CCNA CTP/IP Linux Junos Powershell
10 Cyber Security Windows server Textbook Lot CCNA CTP/IP Linux Junos Powershell

$50.00

View Details
Cyber Security Essentials by Ryan Olson (2010, Trade Paperback)
Cyber Security Essentials by Ryan Olson (2010, Trade Paperback)

$11.25

View Details
How to Measure Anything in Cybersecurity Risk
How to Measure Anything in Cybersecurity Risk

$12.71

View Details
Firewalla 2.5gG Cyber Security Unclaimed
Firewalla 2.5gG Cyber Security Unclaimed

$374.99

View Details
Cybersecurity and Cyberwar: What Everyone Need- paperback, 0199918112, PW Singer
Cybersecurity and Cyberwar: What Everyone Need- paperback, 0199918112, PW Singer

$3.95

View Details
2 1/4" HSI San Antonio Intelligence Division Challenge Coin
2 1/4" HSI San Antonio Intelligence Division Challenge Coin

$11.00

View Details
Secret Service Challenge Coin Rare
Secret Service Challenge Coin Rare

$34.00

View Details
Blue Team Handbook: Incident Response Ed, cyber security responder, Murdoch -NEW
Blue Team Handbook: Incident Response Ed, cyber security responder, Murdoch -NEW

$4.95

View Details
Managing Cybersecurity Risk : Cases Studies and Solutions by Raymond Romero...
Managing Cybersecurity Risk : Cases Studies and Solutions by Raymond Romero...

$5.95

View Details