Cybersecurity issues in emerging technologies (Record no. 654285)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02253cam a22002298i 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781032110363 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9780367626174 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
Item number | MAG |
100 ## - MAIN ENTRY--AUTHOR NAME | |
Personal name | Maglaras, Leandros |
245 00 - TITLE STATEMENT | |
Title | Cybersecurity issues in emerging technologies |
Statement of responsibility, etc | edited by Leandros Maglaras and Ioanna Kantzavelou. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | Boca Raton |
Name of publisher | CRC Press |
Year of publication | 2022 |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | pages cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers"-- |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Hacking |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Internet of things |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Maglaras, Leandros, |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kantzavelou, Ioanna, |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Withdrawn status | Lost status | Damaged status | Not for loan | Home Library | Current Location | Date acquired | Full call number | Accession Number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|
Dept. of Computer Science | Dept. of Computer Science | 11/08/2022 | 005.8 MAG | DCS4967 | 11/08/2022 | Book |