Buch, Englisch, 316 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 493 g
Reihe: Advanced Sciences and Technologies for Security Applications
Buch, Englisch, 316 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 493 g
Reihe: Advanced Sciences and Technologies for Security Applications
ISBN: 978-3-030-98227-0
Verlag: Springer International Publishing
The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master’s degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
Zielgruppe
Graduate
Autoren/Hrsg.
Fachgebiete
- Sozialwissenschaften Soziologie | Soziale Arbeit Spezielle Soziologie Wissenssoziologie, Wissenschaftssoziologie, Techniksoziologie
- Wirtschaftswissenschaften Betriebswirtschaft Management Strategisches Management
- Wirtschaftswissenschaften Betriebswirtschaft Bereichsspezifisches Management E-Commerce, E-Business, E-Marketing
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
Weitere Infos & Material
1. Digital leadership models, strategies and traits.- 2. Social Media, Challenges and Strategies in 5G and 6G.- 3. Cyber Security defence including Ransomware attacks for Small and Medium-Sized Businesses in the digital economy.- 4. Information Governance, security and e-Governance.- 5. The role of AR/ VR and Holographic technology in corporate decision making.- 6. 5G in vertical market transformation.- 7. IoT, IoMT, IIoT and IoNT.- 8. Blockchain and smart contracts.- 9. Zero trust security strategies and guideline.- 10. Predicting Algorithms shaping outcomes through manipulation.