Personnaliser

OK

Cyber Security Using Modern Technologies -

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

216,50 €

Produit Neuf

  • Ou 54,13 € /mois

    • Livraison à 0,01 €
    • Livré entre le 11 et le 19 mai
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032213194_dbm

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Cyber Security Using Modern Technologies de Format Relié  - Livre Informatique

        Note : 0 0 avis sur Cyber Security Using Modern Technologies de Format Relié  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Cyber Security Using Modern Technologies de Format Relié

         - Livre Informatique

        Livre Informatique - 01/08/2023 - Relié - Langue : Anglais

        . .

      • Editeur : Crc Press
      • Langue : Anglais
      • Parution : 01/08/2023
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 290.0
      • Expédition : 664
      • Dimensions : 25.4 x 17.8 x 2.0
      • ISBN : 9781032213194



      • Résumé :
        The main objective of this book is to introduce cyber security using modern technologies like AI, Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security....

        Biographie:

        Dr. Om Pal received B.E. in Computer Science & Engineering from Dr. B. R. Ambedkar University, Agra, MBA in Operation Management from IGNOU, MS (Research) in field of Cryptography from IIT Bombay and Ph.D. in field of Cryptographic Key Management from Jamia Millia Islamia, New Delhi. He has more than 19 years of Academic & Research experience in various areas of Computer Science. He is currently a Scientist-D at Ministry of Electronics and Information Technology, Government of India. He has evolved and worked on many research projects of national interest. Previously he worked at Centre for Development of Advanced Computing (C-DAC) as a Sr. Technical Officer and as an IT Resource Person in National Thermal Power Corporation (NTPC). He has published many research articles in International Journals (Transaction/SCI/Scopus) and International Conferences of repute. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He has delivered many talks on cyber security, Quantum Security and Blockchain Technology. His research interest includes Cryptography, Quantum Cryptography, Cyber Security, Blockchain Technology, Theoretical Computer Science and Cyber Laws.

        Dr. Vinod Kumar is presently working as Assistant Professor with the department of Electronics and Communication (Computer Science and Engineering), University of Allahabad, Prayagraj, Uttar Pradesh, India. Before joining University of Allahabad, he worked as Assistant Professor in the Department of Computer Science and Engineering, Rajkiya Engineering College (REC) Kannauj, UP, India. Prior to this, he worked as Assistant Professor in the School of Information Technology, Centre for Development of Advanced Computing (C-DAC) Noida UP India. He has received MCA from Uttar Pradesh Technical University (UPTU) Lucknow UP, India in 2005, M.Tech in Computer Science and Engineering from Guru Gobind Singh Indraprastha University (GGSIPU) Delhi in 2011, and Ph.D. in field of Cryptographic from Jamia Millia Islamia (JMI), New Delhi. He has published various quality papers in the reputed International Journals like Elsevier, Springer, Wiley, etc. He has also presented various research papers in reputed International Conferences. He has written two books for undergraduate and postgraduate students of computer science and engineering. He has a rich academics & research experience in various areas of computer science. His research interest includes cryptographic protocols, Key management in multicasting/secure group communications, and authentication protocol and security in WSNs.

        Dr. Rijwan Khan received his B.Tech Degree in Computer Science & Engineering from BIT, M.Tech in Computer Science & Engineering from IETE, and Ph.D.in Computer Engineering from Jamia Millia Islamia, New Delhi. He has 16 years of Academic & Research Experience in various areas of Computer Science. He is currently working as Professor and Head of Department Computer Science and Engineering at ABES Institute of Technology, Ghaziabad U.P. He is author of three subject books. He published more than 50 research papers in different journals and conferences. He has been nominated in the board of reviewers of various peer-reviewed and refereed Journals. He is the editor of three research books. He chaired three international conferences and was a keynote speaker in some national and international conferences.

        Prof. Bashir Alam received his B.Tech.(Computer Engineering) from Aligarh Muslim University (A Central University of Government of India), Aligarh, Uttar Pradesh, India, M.Tech.(IT) from Guru Gobind Singh Indraprastha University, Delhi, India and Ph.D., from Jamia Millia Islamia (A Central Univer...

        Sommaire:

        Preface. Acknowledgments. Editors. List of Contributors. Chapter 1 Quantum Computing: A Global Scenario. Chapter 2 Post-Quantum Digital Signatures. Chapter 3 Analysis of Quantum Computing with Food Processing Use Case. Chapter 4 Security of Modern Networks and Its Challenges. Chapter 5 Security and Performance Analysis of Advanced Metering Infrastructure in Smart Grid and Use of Blockchain in Security Perspective. Chapter 6 Computation and Storage Efficient Key Distribution Protocol for Secure Multicast Communication in Centralized Environments. Chapter 7 Effective Key Agreement Protocol for Large and Dynamic Groups Using Elliptic Curve Cryptography. Chapter 8 Cyber Security Using Artificial Intelligence. Chapter 9 Cloud Computing: An Overview of Security Risk Assessment Models and Frameworks. Chapter 10 Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling. Chapter 11 Cyber-Physical Energy Systems Security: Attacks, Vulnerabilities and Risk Management. Chapter 12 Intrusion Detection Using Machine Learning. Chapter 13 Network Forensics. Chapter 14 A Deep Neural Network-Based Biometric Random Key Generator for Security Enhancement. Chapter 15 Quantum Computing and Its Real-World Applications. Chapter 16 Encrypted Network Traffic Classification and Application Identification Employing Deep Learning. Index.

        ...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com