You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed fi...
The book serves as a connecting medium between various domains and Blockchain technology, discussing and embracing how Blockchain technology is transforming all the major sectors of the society. The book facilitates sharing of information, case studies, theoretical and practical knowledge required for Blockchain transformations in various sectors. The book covers different areas that provide the foundational knowledge and comprehensive information about the transformations by Blockchain technology in the fields of business, healthcare, finance, education, supply-chain, sustainability and governance. The book pertains to students, academics, researchers, professionals, and policy makers working in the area of Blockchain technology and related fields.
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) dema...
This book provides an in-depth view of the GRU, the Russian military intelligence agency, in cyberspace. With its Soviet roots, the GRU is a secretive organization that conducts hostile operations in both kinetic and cyber domains. Particularly in cyberspace, the GRU has developed powerful capabilities through various military units and a full spectrum of techniques. These capabilities allow the agency to conduct a wide range of cyberspace operations, from sabotage and espionage to psychological warfare. The complexity of some of these operations, combined with the GRU’s high risk appetite and Spetsnaz-like mindset, makes it one of the most formidable and sophisticated cyber threat actors.
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and def...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and def...