This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups.
Legal Data and Information in Practice provides readers with an understanding of how to facilitate the acquisition, management, and use of legal data in organizations such as libraries, courts, governments, universities, and start-ups.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects.
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.
Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
Many governments around the world are calling for the use of biometric systems to provide crucial societal functions, consequently making it an urgent area for action.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.