- Table View
- List View
Cyber Rules: Strategies for Excelling at E-Business
by Thomas M. Siebel Pat HouseThe book is about the dos and don'ts when doing the business through the Internet. It also has an overview of how the Internet opens new possibilities for business, in a nontechnical language.
Cyber Savvy: Embracing Digital Safety and Civility
by Dr Nancy E. WillardHow to teach students online safety and citizenship Nancy Willard integrates her expertise in risk prevention, law, and education to provide a collaborative and positive process for teaching secondary students positive social norms, safety, and “netiquette.” She lays out the steps for school staff and students to work as a team in building an effective program that will teach young people how to: Keep themselves safe Disclose and consume information wisely Respect the rights, privacy, and property of others Take responsibility for others’ well-being when needed Respond to inappropriate or dangerous situations
Cyber Security
by John G. VoellerCyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.
Cyber Security Applications for Industry 4.0 (Chapman & Hall/CRC Cyber-Physical Systems)
by Noor Zaman Jhanjhi R Sujatha G PrakashCyber Security Applications for Industry 4.0 (CSAI 4.0) provides integrated features of various disciplines in Computer Science, Mechanical, Electrical, and Electronics Engineering which are defined to be Smart systems. It is paramount that Cyber-Physical Systems (CPS) provide accurate, real-time monitoring and control for smart applications and services. With better access to information from real-time manufacturing systems in industrial sectors, the CPS aim to increase the overall equipment effectiveness, reduce costs, and improve efficiency. Industry 4.0 technologies are already enabling numerous applications in a variety of industries. Nonetheless, legacy systems and inherent vulnerabilities in an organization's technology, including limited security mechanisms and logs, make the move to smart systems particularly challenging. Features: Proposes a conceptual framework for Industry 4.0-based Cyber Security Applications concerning the implementation aspect Creates new business models for Industrialists on Control Systems and provides productive workforce transformation Outlines the potential development and organization of Data Protection based on strategies of cybersecurity features and planning to work in the new area of Industry 4.0 Addresses the protection of plants from the frost and insects, automatic hydroponic irrigation techniques, smart industrial farming and crop management in agriculture relating to data security initiatives The book is primarily aimed at industry professionals, academicians, and researchers for a better understanding of the secure data transition between the Industry 4.0 enabled connected systems and their limitations
Cyber Security Cryptography and Machine Learning: 5th International Symposium, CSCML 2021, Be'er Sheva, Israel, July 8–9, 2021, Proceedings (Lecture Notes in Computer Science #12716)
by Shlomi Dolev Oded Margalit Benny Pinkas Alexander SchwarzmannThis book constitutes the refereed proceedings of the 5th International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2021, held in Be'er Sheva, Israel, in July 2021.The 22 full and 13 short papers presented together with a keynote paper in this volume were carefully reviewed and selected from 48 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings (Lecture Notes in Computer Science #10332)
by Shlomi Dolev Sachin LodhaThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
Cyber Security Cryptography and Machine Learning: Fourth International Symposium, CSCML 2020, Be'er Sheva, Israel, July 2–3, 2020, Proceedings (Lecture Notes in Computer Science #12161)
by Vladimir Kolesnikov Shlomi Dolev Sachin Lodha Gera WeissThis book constitutes the refereed proceedings of the Fourth International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2020, held in Beer-Sheva, Israel, in July 2020.The 12 full and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Lecture Notes in Computer Science #10879)
by Shlomi Dolev Sachin Lodha Itai DinurThis book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.
Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27–28, 2019, Proceedings (Lecture Notes in Computer Science #11527)
by Moti Yung Shlomi Dolev Sachin Lodha Danny HendlerThis book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Cyber Security Culture: Counteracting Cyber Threats through Organizational Learning and Training
by David Upton Peter TrimFocusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.
Cyber Security Education: Principles and Policies (Routledge Studies in Conflict, Security and Technology)
by Greg AustinThis book investigates the goals and policy aspects of cyber security education in the light of escalating technical, social and geopolitical challenges. The past ten years have seen a tectonic shift in the significance of cyber security education. Once the preserve of small groups of dedicated educators and industry professionals, the subject is now on the frontlines of geopolitical confrontation and business strategy. Global shortages of talent have created pressures on corporate and national policy for workforce development. Cyber Security Education offers an updated approach to the subject as we enter the next decade of technological disruption and political threats. The contributors include scholars and education practitioners from leading research and education centres in Europe, North America and Australia. This book provides essential reference points for education policy on the new social terrain of security in cyberspace and aims to reposition global debates on what education for security in cyberspace can and should mean. This book will be of interest to students of cyber security, cyber education, international security and public policy generally, as well as practitioners and policy-makers.
Cyber Security Essentials
by Richard Howard James Graham Ryan OlsonThe sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures.To accomplish
Cyber Security Foundations: Fundamentals, Technology and Society
by Keith Martin Konstantinos Mersinas Guido Schmitz Jassim HappaCyber Security Foundations introduces the core topics that all cyber security students and future professionals need to understand the cyber security landscape. It is a key textbook for postgraduate and undergraduate students taking modules related to cyber security and information security, as well as for general readers seeking to deepen their understanding of technical and human-centred digital security concepts.Features include:- Chapters on core areas such as cryptography, computer security, cyber security management, cybercrime and privacy, informed by the CyBOK knowledge areas- Demonstration of how the many facets of the discipline interrelate, allowing readers to gain a comprehensive understanding of the cyber security landscape- Real-world examples to illustrate the application of ideas- Learning outcomes and activities to help reinforce learning and exploration beyond the core text, and a glossary to equip readers with the language necessary to make sense of each topic
Cyber Security Impact on Digitalization and Business Intelligence: Big Cyber Security for Information Management: Opportunities and Challenges (Studies in Big Data #117)
by Muhammad Turki Alshurideh Haitham M. Alzoubi Taher M. GhazalThis book takes a unique approach by exploring the connection between cybersecurity, digitalization, and business intelligence. In today's digital landscape, cybersecurity is a crucial aspect of business operations. Meanwhile, organizations continue to leverage digital technologies for their day-to-day operations. They must be aware of the risks associated with cyber-attacks and implement robust cybersecurity measures to protect their assets. It provides practical insights and solutions to help businesses better understand the impact of cybersecurity on their digitalization and business intelligence strategies. It provides practical insights and solutions for implementing cybersecurity measures in organizations and covers a wide range of topics, including threat intelligence, risk management, compliance, cloud security, and IoT security. The book takes a holistic approach and explores the intersection of cybersecurity, digitalization, and business intelligence and examines the possible challenges and opportunities.
Cyber Security Intelligence and Analytics (Advances in Intelligent Systems and Computing #928)
by Kim-Kwang Raymond Choo Ali Dehghantanha Zheng Xu Reza Parizi Mohammad HammoudehThis book presents the outcomes of the 2019 International Conference on Cyber Security Intelligence and Analytics (CSIA2019), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics.
Cyber Security Intelligence and Analytics: 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021), Volume 1 (Advances in Intelligent Systems and Computing #1342)
by Xiaolu Zhang Zheng Xu Reza M. Parizi Octavio Loyola-GonzálezThis book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cybercrime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber security intelligence and analytics. Due to COVID-19, Authors, Keynote Speakers and PC committees will attend the conference online.
Cyber Security Intelligence and Analytics: 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA2021), Volume 2 (Advances in Intelligent Systems and Computing #1343)
by Xiaolu Zhang Zheng Xu Reza M. Parizi Octavio Loyola-GonzálezThis book presents the outcomes of the 2021 International Conference on Cyber Security Intelligence and Analytics (CSIA 2021), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cybercrime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber security intelligence and analytics. Due to COVID-19, Authors, Keynote Speakers and PC committees will attend the conference online.
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 1 (Advances in Intelligent Systems and Computing #1146)
by Zheng Xu Mohammad Hammoudeh Reza M. Parizi Octavio Loyola-GonzálezThis book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), which was dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly those focusing on threat intelligence, analytics, and preventing cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods, and applications concerning all aspects of cyber security intelligence and analytics. CSIA 2020, which was held in Haikou, China on February 28–29, 2020, built on the previous conference in Wuhu, China (2019), and marks the series’ second successful installment.
Cyber Security Intelligence and Analytics: Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), Volume 2 (Advances in Intelligent Systems and Computing #1147)
by Zheng Xu Mohammad Hammoudeh Reza M. Parizi Octavio Loyola-GonzálezThis book presents the outcomes of the 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber security, particularly focusing on threat intelligence, analytics, and countering cyber crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings, and novel techniques, methods and applications on all aspects of Cyber Security Intelligence and Analytics. The 2020 International Conference on Cyber Security Intelligence and Analytics (CSIA 2020) is held at Feb. 28-29, 2020, in Haikou, China, building on the previous successes in Wuhu, China (2019) is proud to be in the 2nd consecutive conference year.
Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #123)
by Xiaolu Zhang Zheng Xu Saed Alrabaee Octavio Loyola-González Niken Dwi Wahyu Cahyani Nurul Hidayah Ab RahmanThis book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Cyber Security Intelligence and Analytics: The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #125)
by Xiaolu Zhang Zheng Xu Saed Alrabaee Octavio Loyola-González Niken Dwi Wahyu Cahyani Nurul Hidayah Ab RahmanThis book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 (Lecture Notes on Data Engineering and Communications Technologies #172)
by Zheng Xu Saed Alrabaee Octavio Loyola-González Niken Dwi Wahyu Cahyani Nurul Hidayah Ab RahmanThis book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
Cyber Security Intelligence and Analytics: The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 (Lecture Notes on Data Engineering and Communications Technologies #173)
by Zheng Xu Saed Alrabaee Octavio Loyola-González Niken Dwi Wahyu Cahyani Nurul Hidayah Ab RahmanThis book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.
Cyber Security Intelligence and Analytics: The 6th International Conference on Cyber Security Intelligence and Analytics (CSIA 2024), Volume 1 (Lecture Notes in Networks and Systems #1351)
by Zheng Xu Saed Alrabaee Octavio Loyola-González Nurul Hidayah Ab RahmanThis book delves into the latest advancements and innovations in big data analytics as applied to cyber-physical systems within smart city frameworks. Key themes include the integration of IoT, AI, and machine learning for enhanced urban management, sustainable development, and improved quality of life. The book showcases cutting-edge research, practical case studies, and expert insights, making it an invaluable resource for understanding the transformative potential of big data in creating smarter, more connected cities. Don't miss out on this authoritative guide to the future of smart city analytics
Cyber Security Intelligence and Analytics: The 6th International Conference on Cyber Security Intelligence and Analytics (CSIA 2024), Volume 2 (Lecture Notes in Networks and Systems #1352)
by Zheng Xu Octavio Loyola-González Nurul Hidayah Ab Rahman Saed Saleh Al RabaeeThis book delves into the latest advancements and innovations in big data analytics as applied to cyber-physical systems within smart city frameworks. Key themes include the integration of IoT, AI, and machine learning for enhanced urban management, sustainable development, and improved quality of life. The book showcases cutting-edge research, practical case studies, and expert insights, making it an invaluable resource for understanding the transformative potential of big data in creating smarter, more connected cities. Don't miss out on this authoritative guide to the future of smart city analytics