• Complain

Jena Om Prakash - Methods, Implementation, and Application of Cyber Security Intelligence and Analytics

Here you can read online Jena Om Prakash - Methods, Implementation, and Application of Cyber Security Intelligence and Analytics full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Hershey, year: 2022, publisher: Information Science Reference, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jena Om Prakash Methods, Implementation, and Application of Cyber Security Intelligence and Analytics

Methods, Implementation, and Application of Cyber Security Intelligence and Analytics: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Methods, Implementation, and Application of Cyber Security Intelligence and Analytics" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. Methods, Implementation, and Application of Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.

Jena Om Prakash: author's other books


Who wrote Methods, Implementation, and Application of Cyber Security Intelligence and Analytics? Find out the surname, the name of the author of the book and a list of all author's works by series.

Methods, Implementation, and Application of Cyber Security Intelligence and Analytics — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Methods, Implementation, and Application of Cyber Security Intelligence and Analytics" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Methods Implementation and Application of Cyber Security Intelligence and - photo 1
Methods, Implementation, and Application of Cyber Security Intelligence and Analytics
  • Jena Om Prakash
    Ravenshaw University, India
  • H.L. Gururaj
    Vidyavardhaka College of Engineering, India
  • M.R. Pooja
    Vidyavardhaka College of Engineering, India
  • S.P. Pavan Kumar
    Vidyavardhaka College of Engineering, India

A volume in the Advances in Information Security, Privacy, and Ethics (AISPE) Book Series Book Series

Published in the United States of America by IGI Global an imprint of IGI - photo 2Published in the United States of America by IGI Global an imprint of IGI - photo 3

Published in the United States of America by IGI Global (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: cust@igi-global.com Web site: http://www.igi-global.com/reference

Copyright 2022 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.

Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.

Library of Congress Cataloging-in-Publication Data


Names: Jena, Om Prakash editor. | Gururaj, H. L., 1988- editor. | Pooja, M.
R., 1982- editor. | Kumar, S. P. Pavan, 1989- editor.
Title: Methods, implementation, and application of cyber security intelligence and
analytics / Jena Om Prakash, H.L. Gururaj, M.R. Pooja, and S.P. Pavan Kumar,
editors.
Description: Hershey, PA : Information Science Reference, an imprint of IGI
Global, [2022] | Includes bibliographical references and index. |
Summary: "This book looks at the intersection of Artificial Intelligence
and Cyber security which has emerged as one of the most promising use
cases for the advancement of Cyber security in the technological age"-
Provided by publisher.
Identifiers: LCCN 2022012051 (print) | LCCN 2022012052 (ebook) | ISBN
9781668439913 (h/c) | ISBN 9781668439920 (s/c) | ISBN 9781668439937 (ebook)
Subjects: LCSH: Computer networks--Security measures--Data processing. |
Artificial intelligence.
Classification: LCC TK5105.59 .H3525 2022 (print) | LCC TK5105.59 (ebook)
| DDC 005.8--dc23/eng/20220524
LC record available at https://lccn.loc.gov/2022012051
LC ebook record available at https://lccn.loc.gov/2022012052

This book is published under the IGI Global book series Advances in Information Security, Privacy, and Ethics (AISPE) (ISSN: 1948-9730 eISSN: 1948-9749)

British Cataloguing in Publication Data

A Cataloguing in Publication record for this book is available from the British Library.

All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher.

Advances in Information Security Privacy and Ethics AISPE Book Series - photo 4
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series

Manish Gupta (State University of New York, USA)

ISSN: 1948-9730

Mission

As digital technologies become more pervasive in everyday life and the Internet is utilized in ever increasing ways by both private and public entities, concern over digital threats becomes more prevalent.

The Advances in Information Security, Privacy, & Ethics (AISPE) Book Series provides cutting-edge research on the protection and misuse of information and technology across various industries and settings. Comprised of scholarly research on topics such as identity management, cryptography, system security, authentication, and data protection, this book series is ideal for reference by IT professionals, academicians, and upper-level students.

Coverage
  • Security Classifications
  • Security Information Management
  • Global Privacy Concerns
  • Computer ethics
  • Internet Governance
  • IT Risk
  • Device Fingerprinting
  • Access Control
  • Electronic Mail Security
  • CIA Triad of Information Security

IGI Global is currently accepting manuscripts for publications within this series. To submit a proposal for a volume in this series please contact our Acquisition Editors at .

The Advances in Information Security, Privacy, and Ethics (AISPE) Book Series(ISSN 1948-9730) is published by IGI Global, 701 E. Chocolate Avenue, Hershey, PA 17033-1240, USA, www.igi-global.com. This series is composed of titlesavailable for purchase individually; each title is edited to be contextually exclusive from any other title within the series. For pricing and ordering information please visit http://www.igi-global.com/book-series/advances-information-security-privacy-ethics/37157. Postmaster: send all address changes to above address. Copyright 2022 IGI Global. All rights, including translation in other languages reserved by the pulisher. No part of this series may be reproduced or used in any form or by any means - graphics, electronic, or mechanical, including photocopying, recoreding, taping, or information and retrieval systems - without written permission from the publisher, except for non commercial, educational use, including classroom teaching purposes. The views expressed in this series are those of the authors, but not necessarily of IGI Global

Titles in this Series

Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks
Biswa Mohan Sahoo (Amity University, India) and Suman Avdhesh Yadav (Amity University, India)
Information Science Reference copyright 2022 325pp H/C (ISBN: 9781668439210) US $250.00 (our price)

Global Perspectives on Information Security Regulations Compliance, Controls, and Assurance
Guillermo A. Francia III (University of West Florida, USA) and Jeffrey S. Zanzig (Jacksonville State University, USA)
Information Science Reference copyright 2022 309pp H/C (ISBN: 9781799883906) US $240.00 (our price)

Handbook of Research on Cyber Law, Data Protection, and Privacy
Nisha Dhanraj Dewani (Maharaja Agrasen Institute of Management Studies, Guru Gobind Singh Indraprastha University, India) Zubair Ahmed Khan (University School of Law and Legal Studies, Guru Gobind Singh Indraprastha University, India) Aarushi Agarwal (Maharaja Agrasen Institute of Management Studies, India) Mamta Sharma (Gautam Buddha University, India) and Shaharyar Asaf Khan (Manav Rachna University, India)
Information Science Reference copyright 2022 390pp H/C (ISBN: 9781799886419) US $305.00 (our price)

Cybersecurity Crisis Management and Lessons Learned From the COVID-19 Pandemic
Ryma Abassi (Sup'Com, University of Carthage, Tunisia) and Aida Ben Chehida Douss (Sup'Com, University of Carthage, Tunisia)
Information Science Reference copyright 2022 276pp H/C (ISBN: 9781799891642) US $240.00 (our price)

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity
Anacleto Correia (CINAV, Portuguese Naval Academy, Portugal) and Victor Lobo (Nova-IMS, Naval Academy, Portugal)

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Methods, Implementation, and Application of Cyber Security Intelligence and Analytics»

Look at similar books to Methods, Implementation, and Application of Cyber Security Intelligence and Analytics. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Methods, Implementation, and Application of Cyber Security Intelligence and Analytics»

Discussion, reviews of the book Methods, Implementation, and Application of Cyber Security Intelligence and Analytics and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.