Information Technology Security [electronic resource] : Modern Trends and Challenges / edited by Debasis Gountia, Dilip Kumar Dalei, Subhankar Mishra.
Contributor(s): Gountia, Debasis [editor.] | Dalei, Dilip Kumar [editor.] | Mishra, Subhankar [editor.] | SpringerLink (Online service).
Material type: BookSeries: Springer Tracts in Electrical and Electronics Engineering: Publisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2024Edition: 1st ed. 2024.Description: XI, 233 p. 63 illus., 49 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9789819704071.Subject(s): Data protection | Application software | Cooperating objects (Computer systems) | Data and Information Security | Computer and Information Systems Applications | Cyber-Physical SystemsAdditional physical formats: Printed edition:: No title; Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access onlineZero Trust Security Architecture for Digital Privacy in Healthcare -- Security issues and challenges in deploying a CPS using WSN -- Firewall: A Vital Constituent of Network Security -- Exploring the Landscape of Password Managers for Individual Users through Innovative Solution -- Review on Wi-Fi attacks and Detection methods -- Privacy Preserving Spatio-Temporal Attribute Based Access Control for Collaborative E-Healthcare -- Advances in Differential Privacy and Differentially Private Machine Learning -- Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks -- MRMM based keystream generators for information security.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security.
There are no comments for this item.