Cyber defense mechanisms [electronic resource] : security, privacy, and challenges / edited by Gautam Kumar, Dinesh Kumar Saini, and Nguyen Ha Huy Cuong.

Contributor(s): Kumar, Gautam, 1990- | Saini, Dinesh Kumar, 1974- | Cuong, Nguyen Ha HuyMaterial type: TextTextSeries: Publisher: Boca Raton, FL : CRC Press, 2021Description: 1 online resourceISBN: 9781000171983; 1000171981; 9781000171921; 1000171922; 9780367816438; 0367816431; 9781000171952; 1000171957Subject(s): Computer security | Cyber intelligence (Computer security) | Computer networks -- Security measures | COMPUTERS / Security / General | COMPUTERS / Cryptography | COMPUTERS / Computer ScienceDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Taylor & Francis | OCLC metadata license agreement Summary: This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source. The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use. Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.

OCLC-licensed vendor bibliographic record.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571