Gulshan Shrivastava - Böcker
Visar alla böcker från författaren Gulshan Shrivastava. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
1 981 kr
Skickas inom 7-10 vardagar
As we enter the Industrial Revolution 4.0, demands for an increasing degree of trust and privacy protection continue to be voiced. The development of blockchain technology is very important because it can help frictionless and transparent financial transactions and improve the business experience, which in turn has far-reaching effects for economic, psychological, educational and organizational improvements in the way we work, teach, learn and care for ourselves and each other.Blockchain is an eccentric technology, but at the same time, the least understood and most disruptive technology of the day. This book covers the latest technologies of cryptocurrencies and blockchain technology and their applications. This book discusses the blockchain and cryptocurrencies related issues and also explains how to provide the security differently through an algorithm, framework, approaches, techniques and mechanisms. A comprehensive understanding of what blockchain is and how it works, as well as insights into how it will affect the future of your organization and industry as a whole and how to integrate blockchain technology into your business strategy. In addition, the book explores the blockchain and its with other technologies like Internet of Things, big data and artificial intelligence, etc.
2 478 kr
Skickas inom 7-10 vardagar
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, providing a comprehensive toolkit for understanding and combating digital threats and offering practical, insightful guidance ideal for cybersecurity professionals, digital forensic investigators, legal practitioners, law enforcement, scholars, and students. In the rapidly evolving domain of digital security, this book emerges as a vital guide for understanding and addressing the sophisticated landscape of cyber threats. This in-depth volume, featuring contributions from renowned experts, provides a thorough examination of the current state and future challenges in digital security and forensic analysis. The book is meticulously organized into seven sections (excluding conclusion), each focusing on a critical aspect of cybersecurity. It begins with a comprehensive overview of the latest trends and threats in the field, setting the stage for deeper explorations in subsequent sections. Readers will gain insights into a range of topics, from the intricacies of advanced persistent threats and malware, to the security nuances of cyber-physical systems and the Internet of Things (IoT). The book covers cutting-edge topics like blockchain, cryptography, social engineering, cloud security, and data privacy, blending theory with practical case studies. It’s a practical guide for cybersecurity professionals, forensic investigators, legal practitioners, law enforcement, scholars, and students. Offering a comprehensive toolkit for combating digital threats, it’s essential for staying ahead in the fast-evolving field of cybersecurity.
Securing the Digital Frontier
Threats and Advanced Techniques in Security and Forensics
Inbunden, Engelska, 2025
2 240 kr
Skickas inom 7-10 vardagar
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats with insights from leading experts and real-world case studies. In the field of security and forensics, it’s crucial to implement strong security measures to protect sensitive data and effectively respond to cyber incidents. Digital forensics is vital for analyzing cyber threats, where experts use advanced techniques to scrutinize digital artifacts, system logs, and network traffic. This approach helps reconstruct incidents, pinpoint vulnerabilities, and support legal actions, ensuring the confidentiality, integrity, and availability of crucial data in our rapidly evolving digital world. This book provides an in-depth look at security and forensics, pooling knowledge from top experts across various cybersecurity domains. It focuses on real-world applications and case studies, offering valuable insights for protecting information and responding to digital crimes. Designed for cybersecurity professionals, digital forensics investigators, legal teams, and academics, this comprehensive guide is a key resource for anyone looking to deepen their understanding of modern digital forensics and cybersecurity challenges.
2 759 kr
Skickas inom 5-8 vardagar
Forensic Investigations and Risk Management in Mobile and Wireless Communications
Inbunden, Engelska, 2019
2 679 kr
Skickas inom 5-8 vardagar
New Age Analytics
Transforming the Internet through Machine Learning, IoT, and Trust Modeling
Inbunden, Engelska, 2020
1 819 kr
Skickas inom 10-15 vardagar
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more.This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.
New Age Analytics
Transforming the Internet through Machine Learning, IoT, and Trust Modeling
Häftad, Engelska, 2022
1 166 kr
Skickas inom 10-15 vardagar
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more. The book explains how advancements in the world of the web have been achieved and how the experiences of users can be analyzed. It looks at data gathering by the various electronic means and explores techniques for analysis and management, how to manage voluminous data, user responses, and more.This volume provides an abundance of valuable information for professionals and researchers working in the field of business analytics, big data, social network data, computer science, analytical engineering, and forensic analysis. Moreover, the book provides insights and support from both practitioners and academia in order to highlight the most debated aspects in the field.
Cyber Crime and Forensic Computing
Modern Principles, Practices, and Algorithms
Inbunden, Engelska, 2021
2 193 kr
Skickas inom 5-8 vardagar
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.