River Publishers Series in Digital Security and Forensics - Böcker
Visar alla böcker i serien River Publishers Series in Digital Security and Forensics. Handla med fri frakt och snabb leverans.
13 produkter
13 produkter
Mastering Deepfake Technology: Strategies for Ethical Management and Security
Inbunden, Engelska, 2025
1 540 kr
Skickas inom 10-15 vardagar
This book offers a comprehensive exploration of the profound challenges and opportunities presented by deepfake technology across industries, society, and governance. It delves into the multifaceted impacts of synthetic media, examining its potential to reshape corporate trust, economic stability, and public discourse while emphasizing strategies to build resilience and ethical frameworks.Key themes include the role of intellectual capital in safeguarding corporate reputation, the risks of deepfake fraud in financial markets, and the implications for insurance, banking, and fintech sectors. Through cross-disciplinary analyses, the book unravels the disruptive influence of deepfakes on political affairs, economic policies, and corporate transparency.Highlighting real-world case studies, it addresses workplace resilience, data-driven decision-making, and the intersection of deepfake technology with marketing innovation and job satisfaction. From social media marketing to public trust and privacy concerns, the book offers actionable insights for navigating the ethical dilemmas posed by synthetic media.With a focus on collaboration across disciplines, the book equips readers with strategies for mitigating risks, promoting media literacy, and leveraging AI responsibly. Mastering Deepfake Technology is an essential guide for academics, professionals, and policymakers seeking to understand and address the complexities of this emerging frontier.
Security and Privacy of Cyber-Physical Systems
Emerging Trends, Technologies, and Applications
Inbunden, Engelska, 2025
1 610 kr
Skickas inom 10-15 vardagar
This book examines vulnerability threats and attack detection and mitigation, including the associated legal requirements, regulatory frameworks, and policies for enabling the security and privacy of cyber-physical systems. It provides researchers, academics, and practitioners with new insights into the real-world scenarios of deploying, applying, and managing security and privacy frameworks in modern cyber-physical systems.It addresses critical security and privacy concerns, including theoretical analysis, novel system architecture design and implementation, vulnerability discovery, analysis, mitigation, emerging application scenarios, experimental frameworks, and social and ethical dilemmas affecting all parties in cyber-physical systems. The book is an ideal reference for practitioners and researchers in cyber-physical systems, security and privacy, the Internet of Things, advanced cryptography, cyber defensive walls, industrial systems, and cyber threats. It is also a suitable textbook for graduate and senior undergraduate courses in these subjects.
1 540 kr
Skickas inom 10-15 vardagar
This book provides a comprehensive exploration of how artificial intelligence (AI) is revolutionizing cyber risk management, offering advanced methodologies to identify, assess, quantify, and mitigate threats effectively. Through the integration of AI, big data analytics, and emerging technologies, this book presents cutting-edge approaches to addressing cyber risks. Readers will gain insights into how AI enhances threat detection, fraud prevention, risk quantification, and incident response, equipping businesses to anticipate, measure, and mitigate cyber disruptions with greater precision.In today’s digital landscape, businesses increasingly depend on complex cyber systems including cloud computing and data infrastructure, enterprise systems, financial and payment, and other operational systems, which make them susceptible to a wide range of risks beyond conventional security threats. Downtimes, system failures, data breaches, and cyber infrastructure outages can cause significant operational, reputational, and financial disruptions. To navigate these challenges, organizations must move beyond traditional risk management approaches and adopt AI-driven solutions for more proactive and intelligent cyber risk management.Structured around key aspects of AI-driven cyber risk management, the book begins with foundational principles before delving into the rise of AI in cyber risk management, the role of big data in risk analysis, and the application of AI in threat intelligence and fraud detection. Readers will explore AI-powered risk quantification models, automated mitigation strategies, and the integration of AI into cybersecurity infrastructure, business continuity planning, and disaster recovery. Industry-specific case studies offer real-world insights into AI’s impact across different sectors, while discussions on emerging technologies, such as IoT, blockchain, large language models, advanced machine learning, and explainable AI, highlight the future trajectory of AI in cyber risk management.Aimed at professionals, researchers, and students, this book balances technical depth with practical clarity, making it an essential guide for those seeking to bridge the gap between AI innovation and real-world cyber risk applications. By addressing both the potential and challenges of AI-driven solutions, it presents a forward-thinking strategy for building resilient, AI-powered cyber risk management frameworks.
1 802 kr
Kommande
As we move deeper into the era of hyperconnectivity, the convergence of blockchain, 5G, artificial intelligence (AI), and the Internet of Things (IoT) is redefining the digital frontier. Blockchain and AI Amalgamation for IoT Applications Beyond 5G presents a comprehensive and forward-looking exploration of this intersection, offering readers a roadmap toward secure, intelligent, and decentralized networks of the future.The volume brings together 16 carefully curated chapters that move seamlessly from foundational principles to advanced integrations and real-world implementations. Readers will learn how blockchain enhances privacy, data integrity, and decentralized control across 5G-IoT ecosystems, while AI augments these networks with adaptive intelligence and predictive security.Case studies and prototypes illustrate successful deployments, demonstrating how emerging technologies can be applied in practice. Specialized discussions highlight protocols for the internet of vehicles, secure cloud paradigms, VPNs, and even novel travel security applications. The book also explores Blockchain’s transformative role in emerging digital realms such as finance, the metaverse, and beyond.With contributions from leading researchers and practitioners, this book serves as an essential resource for academics, engineers, policymakers, and industry professionals. Whether the reader is designing intelligent edge devices or architecting large-scale IoT infrastructures, the content equips them with the knowledge and tools to innovate securely and sustainably.
1 360 kr
Skickas inom 10-15 vardagar
Explainable AI (XAI) is an upcoming research field in the domain of machine learning. This book aims to provide a detailed description of the topics related to XAI and Blockchain. These two technologies can benefit each other, and the research outcomes will benefit society in multiple ways.Existing AI systems make decisions in a black box manner. Explainable AI delineates how an AI system arrived at a particular decision. It inspects the steps and models that are responsible for making a particular decision. It is an upcoming trend that aims at providing explanations to the AI decisions. Blockchain is emerging as an effective technique for XAI. It enables accessibility to digital ledgers amongst the various AI agents. The AI agents collaborate using consensus and decisions are saved on Blocks. These blocks can be traced back but cannot be changed. Thus, the combination of AI with blockchain provides transparency and visibility to all AI decisions. BlockXAI is also being widely used for improving data security and intelligence. The decisions made are consensus based and decentralized leading to highly efficient AI systems.This book also covers topics that present the convergence of Blockchain with explainable AI and will provide researchers, academics, and industry experts with a complete guide to BlockXAI.
1 495 kr
Skickas inom 10-15 vardagar
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace solutions to counteract attacks. The discussion extends to mitigation strategies against weaponized AI in cyber-attacks, countermeasures for both autonomous vehicles and cyberspace attacks, as well as the limitations and future prospects of artificial intelligence (AI) and data defense in aerospace cybersecurity.A network comprising nodes can establish both cyberspace and outer space platforms for data exchange. Cyberspace finds diverse applications, including commercial endeavors and military defense. The integration of autonomous vehicles, unmanned aircraft systems (UAS), and drones into outer space environments is facilitated through their connection to cyberspace. One illustrative example involves the utilization of blockchain-based secure drone systems for product delivery, leveraging the combined capabilities of cyberspace and outer space security technologies. This book elucidates the intricate dynamics between cyber operations and the expanding realm of autonomous outer cyberspace, presenting new security challenges arising from heightened complexity and emerging vulnerabilities.
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications
Inbunden, Engelska, 2025
1 495 kr
Skickas inom 10-15 vardagar
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries. This book provides indispensable guidance in fortifying cyber defenses for critical infrastructures. Each chapter offers invaluable insights into proactive defense measures, from AI-driven threat management in healthcare systems to practical applications of AI for cyber risk management in critical infrastructures. Unraveling the complexities of contemporary cyber threats, this book empowers readers with the knowledge and tools needed to navigate the intricate landscape of cybersecurity effectively. Through a multidisciplinary approach spanning AI, machine learning, and advanced technologies, it addresses the urgent challenges organizations encounter in securing their digital infrastructure and safeguarding sensitive data from malicious cyber-attacks.Technical topics discussed in the book include:AI-driven strategies for advanced malware detection and preventionHybrid deep learning techniques for precise malware classificationMachine learning applications tailored to IoT security challengesComprehensive exploration of blockchain techniques enhancing IoT security and privacyPractical integration of security analysis modules for proactive threat intelligence.Designed as an essential reference, this book caters to students, researchers, cybersecurity professionals, and individuals keen on comprehending and tackling contemporary cyber defense and risk assessment challenges. It serves as a valuable resource for enhancing cybersecurity awareness, knowledge, and practical skills in critical industries.
Cybersecurity Leadership for Healthcare Organizations and Institutions of Higher Education
Inbunden, Engelska, 2025
1 401 kr
Skickas inom 10-15 vardagar
Healthcare organizations and institutions of higher education have become prime targets of increased cyberattacks. This book explores current cybersecurity trends and effective software applications, AI, and decision-making processes to combat cyberattacks. It emphasizes the importance of compliance, provides downloadable digital forensics software, and examines the psychology of organizational practice for effective cybersecurity leadership.Since the year 2000, research consistently reports devasting results of ransomware and malware attacks impacting healthcare and higher education. These attacks are crippling the ability for these organizations to effectively protect their information systems, information technology, and cloud-based environments. Despite the global dissemination of knowledge, healthcare and higher education organizations continue wrestling to define strategies and methods to secure their information assets, understand methods of assessing qualified practitioners to fill the alarming number of opened positions to help improve how cybersecurity leadership is deployed, as well as improve workplace usage of technology tools without exposing these organizations to more severe and catastrophic cyber incidents.This practical book supports the reader with downloadable digital forensics software, teaches how to utilize this software, as well as correctly securing this software as a key method to improve usage and deployment of these software applications for effective cybersecurity leadership. Furthermore, readers will understand the psychology of industrial organizational practice as it correlates with cybersecurity leadership. This is required to improve management of workplace conflict, which often impedes personnel’s ability to comply with cybersecurity law and policy, domestically and internationally.
1 540 kr
Skickas inom 10-15 vardagar
This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web application security. Designed for professionals who may lack formal training in cybersecurity or those seeking to update their skills, this book offers a crucial toolkit for defending against the rising tide of cyber threats.As web applications become central to our digital lives, understanding and countering web-based threats is imperative for IT professionals across various sectors. This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners.Explore the architecture of web applications and the common vulnerabilities as identified by industry leaders like OWASP.Gain practical skills in information gathering, vulnerability assessment, and the exploitation of security gaps.Master advanced tools such as Burp Suite and learn the intricacies of various attack strategies through real-world case studies.Dive into the integration of security practices into development processes with a detailed look at DevSecOps and secure coding practices."Web Application PenTesting" is more than a technical manual—it is a guide designed to equip its readers with the analytical skills and knowledge to make informed security decisions, ensuring robust protection for digital assets in the face of evolving cyber threats. Whether you are an engineer, project manager, or technical leader, this book will empower you to fortify your web applications and contribute effectively to your organization’s cybersecurity efforts.
1 540 kr
Skickas inom 10-15 vardagar
This book provides a comprehensive overview of security and privacy challenges in 6G networks, addressing the urgent need for advanced security frameworks as the next generation of wireless technology emerges. The rapid advancements in quantum computing, AI, and IoT are transforming the digital landscape, introducing both unprecedented opportunities and significant security threats. From AI-driven cyberattacks to the vulnerabilities of IoT devices, this book explores cutting-edge technologies such as quantum key distribution (QKD), post-quantum cryptography, and AI-enabled security systems.Designed for professionals and researchers, this resource outlines real-world applications of 6G security techniques, offering practical insights into protecting critical infrastructures, autonomous vehicles, smart cities, and more. By emphasizing a proactive approach to cybersecurity and fostering collaboration across industries, academia, and policymakers, the book lays out a roadmap for ensuring the resilience and trustworthiness of 6G networks in the future.
1 428 kr
Skickas inom 10-15 vardagar
Digital forensics is the science of detecting evidence from digital media like a computer, smartphone, server, or network. It provides the forensic team with the most beneficial methods to solve confused digital-related cases. AI and blockchain can be applied to solve online predatory chat cases and photo forensics cases, provide network service evidence, custody of digital files in forensic medicine, and identify roots of data scavenging. The increased use of PCs and extensive use of internet access, have meant easy availability of hacking tools. Over the past two decades, improvements in the information technology landscape have made the collection, preservation, and analysis of digital evidence extremely important. The traditional tools for solving cybercrimes and preparing court cases are making investigations difficult. We can use AI and blockchain design frameworks to make the digital forensic process efficient and straightforward. AI features help determine the contents of a picture, detect spam email messages and recognize swatches of hard drives that could contain suspicious files. Blockchain-based lawful evidence management schemes can supervise the entire evidence flow of all of the court data.This book provides a wide-ranging overview of how AI and blockchain can be used to solve problems in digital forensics using advanced tools and applications available on the market.
Implementing Enterprise Cyber Security with Open-Source Software and Standard Architecture: Volume II
Inbunden, Engelska, 2023
1 428 kr
Skickas inom 10-15 vardagar
Cyber security is one of the most critical problems faced by enterprises, government organizations, education institutes, small and medium scale businesses, and medical institutions today. Creating a cyber security posture through proper cyber security architecture, deployment of cyber defense tools, and building a security operation center are critical for all such organizations given the preponderance of cyber threats. However, cyber defense tools are expensive, and many small and medium-scale business houses cannot procure these tools within their budgets. Even those business houses that manage to procure them cannot use them effectively because of the lack of human resources and the knowledge of the standard enterprise security architecture. In 2020, the C3i Center at the Indian Institute of Technology Kanpur developed a professional certification course where IT professionals from various organizations go through rigorous six-month long training in cyber defense. During their training, groups within the cohort collaborate on team projects to develop cybersecurity solutions for problems such as malware analysis, threat intelligence collection, endpoint detection and protection, network intrusion detection, developing security incidents, event management systems, etc. All these projects leverage open-source tools, and code from various sources, and hence can be also constructed by others if the recipe to construct such tools is known. It is therefore beneficial if we put these recipes out in the form of book chapters such that small and medium scale businesses can create these tools based on open-source components, easily following the content of the chapters. In 2021, we published the first volume of this series based on the projects done by cohort 1 of the course. This volume, second in the series has new recipes and tool development expertise based on the projects done by cohort 3 of this training program. This volume consists of nine chapters that describe experience and know-how of projects in malware analysis, web application security, intrusion detection system, and honeypot in sufficient detail so they can be recreated by anyone looking to develop home grown solutions to defend themselves from cyber-attacks.
1 319 kr
Skickas inom 10-15 vardagar
This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements.Technical topics discussed in the book include but are not limited to:Risks affecting crowdsensing platformsSpatio-temporal privacy of crowdsourced applicationsDifferential privacy for data mining crowdsourcingBlockchain-based crowdsourcingSecure wireless mobile crowdsensing.This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.