
Information Security Handbook
- 248 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains.
Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through the IoT ecosystem and implications to the real world and, at the same time, explains the concepts of IoT-related technologies, trends, and future directions.
University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Editor Biographies
- Contributors
- 1 SC-MCHMP: Score-Based Cluster Level Hybrid Multi-Channel MAC Protocol for Wireless Sensor Network
- 2 Software-Defined Networking (SDN) Security Concerns
- 3 Clustering in Wireless Sensor Networks Using Adaptive Neuro-Fuzzy Inference Logic
- 4 Security in Big Data
- 5 Prevention of DOS/DDOS Attacks Through Expert Honey-Mesh Security Infrastructure
- 6 Efficient Feature Grouping for IDS Using Clustering Algorithms in Detecting Known/Unknown Attacks
- 7 PDF Malware Classifiers – A Survey, Future Directions, and Recommended Methodology
- 8 Key Authentication Schemes for Medical Cyber Physical System
- 9 Ransomware Attack: Threats & Different Detection Technique
- 10 Security Management System (SMS)
- 11 Automatic Street Light Control Based on Pedestrian and Automobile Detection
- 12 Cost-Oriented Electronic Voting System Using Hashing Function with Digital Persona
- 13 Blockchain-Based Supply Chain System Using Intelligent Chatbot with IoT-RFID
- Index