Security solutions for hyperconnectivity and the Internet of things
This book offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks by calling for revolutionary protection strategies to reassess security
Saved in:
| Other Authors: | Dawson, Maurice 1982- (Editor), Eltayeb, Mohamed 1978- (Editor), Omar, Marwan 1982- (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2017]
|
| Series: | Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Managing cyber threats
Published: (2015)
Published: (2015)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
The use of cyberspace as a platform to conduct cyberterrorism a case study on ISIS
by: Ahmad Nizam Adnan
by: Ahmad Nizam Adnan
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Utilization of new technologies in global terror emerging research and opportunities
by: Stacey, Emily 1984
Published: (2019)
by: Stacey, Emily 1984
Published: (2019)
Cryptographic security solutions for the Internet of Things
Published: (2019)
Published: (2019)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Policing digital crime
Published: (2014)
Published: (2014)
Internet of things, for things, and by things
by: Chaudhuri, Abhik
Published: (2019)
by: Chaudhuri, Abhik
Published: (2019)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
A study on the collaboration of cyber terror response policy of South Korea-U.S.
by: Lee, Eun Kyeong
by: Lee, Eun Kyeong
Internet of things (IoT) technologies, applications, challenges, and solutions
Published: (2018)
Published: (2018)
Internet of things challenges, advances, and applications
Published: (2018)
Published: (2018)
Developing safer online environments for children tools and policies for combatting cyber aggression
Published: (2020)
Published: (2020)
Internet-of-Things (IoT) Systems : Architectures, Algorithms, Methodologies /
by: Serpanos, Dimitrios Nikolaou, et al.
Published: (2018)
by: Serpanos, Dimitrios Nikolaou, et al.
Published: (2018)
A history of cyber security attacks 1980 to present
by: Middleton, Bruce
Published: (2017)
by: Middleton, Bruce
Published: (2017)
Security and privacy in internet of things (IoTs) models, algorithms, and implementations
Published: (2016)
Published: (2016)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
The Internet of things foundation for smart cities, eHealth and ubiquitous computing
Published: (2018)
Published: (2018)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
The internet of things what everyone needs to know
by: Shackelford, Scott J.
Published: (2020)
by: Shackelford, Scott J.
Published: (2020)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019)
Published: (2019)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Handbook of research on modern cryptographic solutions for computer and cyber security
Published: (2016)
Published: (2016)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Security awareness applying practical security in your world
by: Ciampa, Mark D.
Published: (2010)
by: Ciampa, Mark D.
Published: (2010)
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
Similar Items
-
Cyber insecurity navigating the perils of the next information age
Published: (2016) -
Managing cyber threats
Published: (2015) -
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015) -
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020) -
Combating security breaches and criminal activity in the digital sphere
Published: (2016)


