Modern Principles, Practices, and Algorithms for Cloud Security
Title | Modern Principles, Practices, and Algorithms for Cloud Security PDF eBook |
Author | Gupta, Brij B. |
Publisher | IGI Global |
Pages | 361 |
Release | 2019-09-27 |
Genre | Computers |
ISBN | 1799810844 |
In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a tool that has proven to be a versatile piece of software within IT. Unfortunately, the high usage of Cloud has raised many concerns related to privacy, security, and data protection that have prevented cloud computing solutions from becoming the prevalent alternative for mission critical systems. Up-to-date research and current techniques are needed to help solve these vulnerabilities in cloud computing. Modern Principles, Practices, and Algorithms for Cloud Security is a pivotal reference source that provides vital research on the application of privacy and security in cloud computing. While highlighting topics such as chaos theory, soft computing, and cloud forensics, this publication explores present techniques and methodologies, as well as current trends in cloud protection. This book is ideally designed for IT specialists, scientists, software developers, security analysts, computer engineers, academicians, researchers, and students seeking current research on the defense of cloud services.
Handbook of Research on Intrusion Detection Systems
Title | Handbook of Research on Intrusion Detection Systems PDF eBook |
Author | Gupta, Brij B. |
Publisher | IGI Global |
Pages | 407 |
Release | 2020-02-07 |
Genre | Computers |
ISBN | 1799822435 |
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
Handbook of Research on Modern Educational Technologies, Applications, and Management
Title | Handbook of Research on Modern Educational Technologies, Applications, and Management PDF eBook |
Author | Khosrow-Pour D.B.A., Mehdi |
Publisher | IGI Global |
Pages | 950 |
Release | 2020-07-10 |
Genre | Education |
ISBN | 1799834778 |
As technology and technological advancements become a more prevalent and essential aspect of daily and business life, educational institutions must keep pace in order to maintain relevance and retain their ability to adequately prepare students for their lives beyond education. Such institutions and their leaders are seeking relevant strategies for the implementation and effective use of new and upcoming technologies and leadership strategies to best serve students and educators within educational settings. As traditional education methods become more outdated, strategies to supplement and bolster them through technology and effective management become essential to the success of institutions and programs. The Handbook of Research on Modern Educational Technologies, Applications, and Management is an all-encompassing two-volume scholarly reference comprised of 58 original and previously unpublished research articles that provide cutting-edge, multidisciplinary research and expert insights on advancing technologies used in educational settings as well as current strategies for administrative and leadership roles in education. Covering a wide range of topics including but not limited to community engagement, educational games, data management, and mobile learning, this publication provides insights into technological advancements with educational applications and examines forthcoming implementation strategies. These strategies are ideal for teachers, instructional designers, curriculum developers, educational software developers, and information technology specialists looking to promote effective learning in the classroom through cutting-edge learning technologies, new learning theories, and successful leadership tactics. Administrators, educational leaders, educational policymakers, and other education professionals will also benefit from this publication by utilizing the extensive research on managing educational institutions and providing valuable training and professional development initiatives as well as implementing the latest administrative technologies. Additionally, academicians, researchers, and students in areas that include but are not limited to educational technology, academic leadership, mentorship, learning environments, and educational support systems will benefit from the extensive research compiled within this publication.
New Age Cyber Threat Mitigation for Cloud Computing Networks
Title | New Age Cyber Threat Mitigation for Cloud Computing Networks PDF eBook |
Author | Akashdeep Bhardwaj |
Publisher | Bentham Science Publishers |
Pages | 184 |
Release | 2023-06-14 |
Genre | Computers |
ISBN | 9815136127 |
Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks. New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era. These topics include: · Ransomware and DDoS attacks · Security algorithms · Design and implementation solutions for resilient and fault-tolerant cloud and network services · Security policy · End user data security The book is an essential resource for anyone involved in cloud computing and network security, including learners, professionals and enthusiasts.
Cyber Security, Privacy and Networking
Title | Cyber Security, Privacy and Networking PDF eBook |
Author | Dharma P. Agrawal |
Publisher | Springer Nature |
Pages | 404 |
Release | 2022-05-14 |
Genre | Technology & Engineering |
ISBN | 9811686645 |
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.
Cognitive Computing Using Green Technologies
Title | Cognitive Computing Using Green Technologies PDF eBook |
Author | Asis Kumar Tripathy |
Publisher | CRC Press |
Pages | 297 |
Release | 2021-03-29 |
Genre | Technology & Engineering |
ISBN | 100033788X |
Cognitive Computing is a new topic which aims to simulate human thought processes using computers that self-learn through data mining, pattern recognition, and natural language processing. This book focuses on the applications of Cognitive Computing in areas like Robotics, Blockchain, Deep Learning, and Wireless Technologies. This book covers the basics of Green Computing, discusses Cognitive Science methodologies in Robotics, Computer Science, Wireless Networks, and Deep Learning. It goes on to present empirical data and research techniques, modelling techniques and offers a data-driven approach to decision making and problem solving. This book is written for researchers, academicians, undergraduate and graduate students, and industry persons who are working on current applications of Cognitive Computing.
Advanced Smart Computing Technologies in Cybersecurity and Forensics
Title | Advanced Smart Computing Technologies in Cybersecurity and Forensics PDF eBook |
Author | Keshav Kaushik |
Publisher | CRC Press |
Pages | 273 |
Release | 2021-12-15 |
Genre | Computers |
ISBN | 1000520617 |
This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first objective is to learn and understand the need for and impact of advanced cybersecurity and forensics and its implementation with multiple smart computational technologies. This objective answers why and how cybersecurity and forensics have evolved as one of the most promising and widely-accepted technologies globally and has widely-accepted applications. The second objective is to learn how to use advanced cybersecurity and forensics practices to answer computational problems where confidentiality, integrity, and availability are essential aspects to handle and answer. This book is structured in such a way so that the field of study is relevant to each reader’s major or interests. It aims to help each reader see the relevance of cybersecurity and forensics to their career or interests. This book intends to encourage researchers to develop novel theories to enrich their scholarly knowledge to achieve sustainable development and foster sustainability. Readers will gain valuable knowledge and insights about smart computing technologies using this exciting book. This book: • Includes detailed applications of cybersecurity and forensics for real-life problems • Addresses the challenges and solutions related to implementing cybersecurity in multiple domains of smart computational technologies • Includes the latest trends and areas of research in cybersecurity and forensics • Offers both quantitative and qualitative assessments of the topics Includes case studies that will be helpful for the researchers Prof. Keshav Kaushik is Assistant Professor in the Department of Systemics, School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. Dr. Shubham Tayal is Assistant Professor at SR University, Warangal, India. Dr. Akashdeep Bhardwaj is Professor (Cyber Security & Digital Forensics) at the University of Petroleum & Energy Studies (UPES), Dehradun, India. Dr. Manoj Kumar is Assistant Professor (SG) (SoCS) at the University of Petroleum and Energy Studies, Dehradun, India.