Get Free Shipping on orders over $79
Cyber Security Using Modern Technologies : Artificial Intelligence, Blockchain and Quantum Cryptography - Om Pal

Cyber Security Using Modern Technologies

Artificial Intelligence, Blockchain and Quantum Cryptography

By: Om Pal (Editor), Vinod Kumar (Editor), Rijwan Khan (Editor), Bashir Alam (Editor), Mansaf Alam (Editor)

Paperback | 19 December 2024 | Edition Number 1

At a Glance

Paperback


$170.99

or 4 interest-free payments of $42.75 with

 or 

Ships in 15 to 25 business days

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.

More in Computer Security

Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Code Dependent : Living in the Shadow of AI - Madhumita Murgia

RRP $24.99

$21.75

13%
OFF
Mindf*ck : Inside Cambridge Analytica's Plot to Break the World - Profile Books
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$38.75

22%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF