Cyber security using modern technologies: artificial intelligence, blockchain and quantum cryptography
"The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing,...
Gespeichert in:
Weitere beteiligte Personen: | , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2024
|
Ausgabe: | First edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000908060/?ar |
Zusammenfassung: | "The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures and Artificial Intelligence for cyber security of modern networks and it also covers various cyber-attacks and the defence measures, strategies and techniques that need to be followed to combat them, the book goes on to explore several crucial topics such as security of Advanced Metering Infrastructure in Smart Grids, key management protocols, Network Forensic, Intrusion Detection Using Machine Learning, Cloud computing security risk assessment model and framework, Cyber-Physical Energy Systems Security, Biometric Random Key Generator using Deep Neural Network and Encrypted Network Traffic Classification. Additionally, the book provides new techniques to handle the modern threats with more intelligence. It also includes some modern techniques for cyber security such as blockchain for modern security, quantum cryptography, forensic tools etc. Additionally, it provides a comprehensive survey of cutting-edge research on cybersecurity of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in the book thoroughly examine the constraints of network including computation, communication and storage cost constraints, etc and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, the book would prove extremely helpful to readers. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security"-- |
Beschreibung: | Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on July 11, 2023) |
Umfang: | 1 Online-Ressource (xv, 271 Seiten) illustrations |
ISBN: | 9781000908022 100090802X 9781003267812 1003267815 9781000908060 1000908062 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-110156757 | ||
003 | DE-627-1 | ||
005 | 20241202095347.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241202s2024 xx |||||o 00| ||eng c | ||
020 | |a 9781000908022 |c electronic book |9 978-1-000-90802-2 | ||
020 | |a 100090802X |c electronic book |9 1-000-90802-X | ||
020 | |a 9781003267812 |c electronic book |9 978-1-003-26781-2 | ||
020 | |a 1003267815 |c electronic book |9 1-003-26781-5 | ||
020 | |a 9781000908060 |c electronic book |9 978-1-000-90806-0 | ||
020 | |a 1000908062 |c electronic book |9 1-000-90806-2 | ||
035 | |a (DE-627-1)110156757 | ||
035 | |a (DE-599)KEP110156757 | ||
035 | |a (ORHE)9781000908060 | ||
035 | |a (DE-627-1)110156757 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a TEC |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23/eng/20230201 | |
245 | 1 | 0 | |a Cyber security using modern technologies |b artificial intelligence, blockchain and quantum cryptography |c edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2024 | |
264 | 4 | |c ©2024 | |
300 | |a 1 Online-Ressource (xv, 271 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on July 11, 2023) | ||
520 | |a "The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures and Artificial Intelligence for cyber security of modern networks and it also covers various cyber-attacks and the defence measures, strategies and techniques that need to be followed to combat them, the book goes on to explore several crucial topics such as security of Advanced Metering Infrastructure in Smart Grids, key management protocols, Network Forensic, Intrusion Detection Using Machine Learning, Cloud computing security risk assessment model and framework, Cyber-Physical Energy Systems Security, Biometric Random Key Generator using Deep Neural Network and Encrypted Network Traffic Classification. Additionally, the book provides new techniques to handle the modern threats with more intelligence. It also includes some modern techniques for cyber security such as blockchain for modern security, quantum cryptography, forensic tools etc. Additionally, it provides a comprehensive survey of cutting-edge research on cybersecurity of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in the book thoroughly examine the constraints of network including computation, communication and storage cost constraints, etc and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, the book would prove extremely helpful to readers. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security"-- | ||
650 | 0 | |a Computer security |x Technological innovations | |
650 | 4 | |a Sécurité informatique ; Innovations | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Security / General | |
700 | 1 | |a Pal, Om |e HerausgeberIn |4 edt | |
700 | 1 | |a Kumar, Vinod |e HerausgeberIn |4 edt | |
700 | 1 | |a Khan, Rijwan |d 1981- |e HerausgeberIn |4 edt | |
700 | 1 | |a Alam, Bashir |e HerausgeberIn |4 edt | |
700 | 1 | |a Alam, Mansaf |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781032213194 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781032213194 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000908060/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-110156757 |
---|---|
_version_ | 1821494924488474625 |
adam_text | |
any_adam_object | |
author2 | Pal, Om Kumar, Vinod Khan, Rijwan 1981- Alam, Bashir Alam, Mansaf |
author2_role | edt edt edt edt edt |
author2_variant | o p op v k vk r k rk b a ba m a ma |
author_facet | Pal, Om Kumar, Vinod Khan, Rijwan 1981- Alam, Bashir Alam, Mansaf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)110156757 (DE-599)KEP110156757 (ORHE)9781000908060 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04266nam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-110156757</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241202095347.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241202s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000908022</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-90802-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">100090802X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-90802-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003267812</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-003-26781-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003267815</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-003-26781-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000908060</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-000-90806-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000908062</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-000-90806-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110156757</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP110156757</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000908060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)110156757</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230201</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber security using modern technologies</subfield><subfield code="b">artificial intelligence, blockchain and quantum cryptography</subfield><subfield code="c">edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xv, 271 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on July 11, 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures and Artificial Intelligence for cyber security of modern networks and it also covers various cyber-attacks and the defence measures, strategies and techniques that need to be followed to combat them, the book goes on to explore several crucial topics such as security of Advanced Metering Infrastructure in Smart Grids, key management protocols, Network Forensic, Intrusion Detection Using Machine Learning, Cloud computing security risk assessment model and framework, Cyber-Physical Energy Systems Security, Biometric Random Key Generator using Deep Neural Network and Encrypted Network Traffic Classification. Additionally, the book provides new techniques to handle the modern threats with more intelligence. It also includes some modern techniques for cyber security such as blockchain for modern security, quantum cryptography, forensic tools etc. Additionally, it provides a comprehensive survey of cutting-edge research on cybersecurity of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in the book thoroughly examine the constraints of network including computation, communication and storage cost constraints, etc and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, the book would prove extremely helpful to readers. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pal, Om</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Vinod</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Rijwan</subfield><subfield code="d">1981-</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alam, Bashir</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Alam, Mansaf</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781032213194</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781032213194</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000908060/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-110156757 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:06Z |
institution | BVB |
isbn | 9781000908022 100090802X 9781003267812 1003267815 9781000908060 1000908062 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xv, 271 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | CRC Press |
record_format | marc |
spelling | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam First edition. Boca Raton, FL CRC Press 2024 ©2024 1 Online-Ressource (xv, 271 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Description based on online resource; title from digital title page (viewed on July 11, 2023) "The main objective of this book is to introduces cyber security using modern technologies like Artificial Intelligence, Quantum Cryptography and Blockchain. The book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures and Artificial Intelligence for cyber security of modern networks and it also covers various cyber-attacks and the defence measures, strategies and techniques that need to be followed to combat them, the book goes on to explore several crucial topics such as security of Advanced Metering Infrastructure in Smart Grids, key management protocols, Network Forensic, Intrusion Detection Using Machine Learning, Cloud computing security risk assessment model and framework, Cyber-Physical Energy Systems Security, Biometric Random Key Generator using Deep Neural Network and Encrypted Network Traffic Classification. Additionally, the book provides new techniques to handle the modern threats with more intelligence. It also includes some modern techniques for cyber security such as blockchain for modern security, quantum cryptography, forensic tools etc. Additionally, it provides a comprehensive survey of cutting-edge research on cybersecurity of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in the book thoroughly examine the constraints of network including computation, communication and storage cost constraints, etc and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, the book would prove extremely helpful to readers. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers, graduate students and engineers in the fields of cryptography and network security"-- Computer security Technological innovations Sécurité informatique ; Innovations COMPUTERS / Networking / Security COMPUTERS / Security / General Pal, Om HerausgeberIn edt Kumar, Vinod HerausgeberIn edt Khan, Rijwan 1981- HerausgeberIn edt Alam, Bashir HerausgeberIn edt Alam, Mansaf HerausgeberIn edt 9781032213194 Erscheint auch als Druck-Ausgabe 9781032213194 |
spellingShingle | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography Computer security Technological innovations Sécurité informatique ; Innovations COMPUTERS / Networking / Security COMPUTERS / Security / General |
title | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography |
title_auth | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography |
title_exact_search | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography |
title_full | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
title_fullStr | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
title_full_unstemmed | Cyber security using modern technologies artificial intelligence, blockchain and quantum cryptography edited by Om Pal, Vinod Kumar, Rijwan Khan, Bashir Alam, Mansaf Alam |
title_short | Cyber security using modern technologies |
title_sort | cyber security using modern technologies artificial intelligence blockchain and quantum cryptography |
title_sub | artificial intelligence, blockchain and quantum cryptography |
topic | Computer security Technological innovations Sécurité informatique ; Innovations COMPUTERS / Networking / Security COMPUTERS / Security / General |
topic_facet | Computer security Technological innovations Sécurité informatique ; Innovations COMPUTERS / Networking / Security COMPUTERS / Security / General |
work_keys_str_mv | AT palom cybersecurityusingmoderntechnologiesartificialintelligenceblockchainandquantumcryptography AT kumarvinod cybersecurityusingmoderntechnologiesartificialintelligenceblockchainandquantumcryptography AT khanrijwan cybersecurityusingmoderntechnologiesartificialintelligenceblockchainandquantumcryptography AT alambashir cybersecurityusingmoderntechnologiesartificialintelligenceblockchainandquantumcryptography AT alammansaf cybersecurityusingmoderntechnologiesartificialintelligenceblockchainandquantumcryptography |