|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Jahankhani, Hamid |
Wireless Networks |
I12814 |
2023 |
eBook |
|
2 |
Jahankhani, Hamid |
AI, Blockchain and Self-Sovereign Identity in Higher Education |
I12743 |
2023 |
eBook |
|
3 |
Abaimov, Stanislav |
Machine Learning for Cyber Agents |
I12486 |
2022 |
Book |
|
4 |
Wolf, Ramona |
Quantum Key Distribution |
I11775 |
2021 |
eBook |
|
5 |
Grasselli, Federico |
Quantum Cryptography |
I11706 |
2021 |
eBook |
|
6 |
Patel, Dhiren |
IC-BCT 2019 |
I09718 |
2020 |
eBook |
|
7 |
Malizia, Andrea |
Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference |
I08562 |
2018 |
eBook |
|
|
1.
|
|
Title | Wireless Networks : Cyber Security Threats and Countermeasures |
Author(s) | Jahankhani, Hamid;El Hajjar, Ayman |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2023. |
Description | VI, 348 p. 161 illus., 129 illus. in color : online resource |
Abstract Note | In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master???s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills |
ISBN,Price | 9783031336317 |
Keyword(s) | 1. Computer crimes
2. COMPUTER NETWORKS
3. Cybercrime
4. Data and Information Security
5. Data protection
6. EBOOK - SPRINGER
7. Mobile and Network Security
8. Mobile communication systems
9. Wireless and Mobile Communication
10. Wireless communication systems
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12814 |
|
|
On Shelf |
|
|
|
|
2.
|
|
Title | AI, Blockchain and Self-Sovereign Identity in Higher Education |
Author(s) | Jahankhani, Hamid;Jamal, Arshad;Brown, Guy;Sainidis, Eustathios;Fong, Rose;Butt, Usman J |
Publication | Cham, 1. Imprint: Springer
2. Springer Nature Switzerland, 2023. |
Description | VI, 313 p. 151 illus., 132 illus. in color : online resource |
Abstract Note | This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning? The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education. The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills |
ISBN,Price | 9783031336270 |
Keyword(s) | 1. ARTIFICIAL INTELLIGENCE
2. COMPUTER NETWORKS
3. Data and Information Security
4. Data protection
5. EBOOK - SPRINGER
6. Education, Higher
7. HIGHER EDUCATION
8. Mobile and Network Security
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12743 |
|
|
On Shelf |
|
|
|
|
3.
|
|
Title | Machine Learning for Cyber Agents : Attack and Defence |
Author(s) | Abaimov, Stanislav;Martellini, Maurizio |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | XV, 227 p. 27 illus., 23 illus. in color : online resource |
Abstract Note | The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ??? the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention |
ISBN,Price | 9783030915858 |
Keyword(s) | 1. Computer networks???Security measures
2. Data and Information Security
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. MACHINE LEARNING
7. Mobile and Network Security
8. Security Science and Technology
9. Security systems
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12486 |
|
|
On Shelf |
|
|
|
|
4.
|
|
Title | Quantum Key Distribution : An Introduction with Exercises |
Author(s) | Wolf, Ramona |
Publication | Cham, Springer International Publishing, 2021. |
Description | XI, 229 p. 56 illus., 31 illus. in color : online resource |
Abstract Note | This textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk. The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required |
ISBN,Price | 9783030739911 |
Keyword(s) | 1. Data and Information Security
2. Data protection
3. Data structures (Computer science)
4. Data Structures and Information Theory
5. EBOOK
6. EBOOK - SPRINGER
7. INFORMATION THEORY
8. QUANTUM COMMUNICATION
9. Quantum Communications and Cryptography
10. Quantum computing
11. QUANTUM INFORMATION
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11775 |
|
|
On Shelf |
|
|
|
|
6.
|
|
Title | IC-BCT 2019 : Proceedings of the International Conference on Blockchain Technology |
Author(s) | Patel, Dhiren;Nandi, Sukumar;Mishra, B.K;Shah, Deven;Modi, Chirag N;Shah, Kamal;Bansode, Rajesh S |
Publication | Singapore, Springer Singapore, 2020. |
Description | XII, 258 p. 126 illus., 55 illus. in color : online resource |
Abstract Note | This book presents articles from the International Conference on Blockchain Technology (IC-BCT) 2019, held in Mumbai, India, and highlights recent advances in the field. It brings together researchers and industry practitioners to show case their ideas linked to business case studies, and provides an opportunity for engineers, researchers, startups and professionals in the field of Blockchain technology to further collaboration |
ISBN,Price | 9789811545429 |
Keyword(s) | 1. Big data
2. BIG DATA ANALYTICS
3. COMPUTER ENGINEERING
4. Cyber-physical systems, IoT
5. Data protection
6. Data-driven Science, Modeling and Theory Building
7. EBOOK
8. EBOOK - SPRINGER
9. ECONOPHYSICS
10. Embedded computer systems
11. Internet of things
12. Security
13. Sociophysics
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I09718 |
|
|
On Shelf |
|
|
|
|
7.
| |
Title | Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference : Science as the first countermeasure for CBRNE and Cyber threats |
Author(s) | Malizia, Andrea;D'Arienzo, Marco |
Publication | Cham, Springer International Publishing, 2018. |
Description | XII, 458 p. 160 illus., 140 illus. in color : online resource |
Abstract Note | This book presents the proceedings of SICC 2017, a conference devoted to promoting the dissemination of the different methodologies, techniques, theories, strategies, technologies and best practices on the prevention and mitigation of CBRNE risks. As the first scientific international conference on safety & security issues in the CBRNE field, SICC 2017 attracted contributions resulting from fruitful inter-professional collaborations between university and military experts, specialized operators, decision makers and the industry. As such, these proceedings are primarily intended for academics and professionals from public, private and military entities. It is the first trans-disciplinary collection of scientific papers from the numerous fields related to CBRNE |
ISBN,Price | 9783319917917 |
Keyword(s) | 1. CHEMISTRY
2. COMPUTER SECURITY
3. Data protection
4. EBOOK
5. EBOOK - SPRINGER
6. Effects of Radiation/Radiation Protection
7. Radiation protection
8. Radiation???Safety measures
9. Safety in Chemistry, Dangerous Goods
10. Security
11. Security Science and Technology
12. System safety
13. Systems and Data Security
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I08562 |
|
|
On Shelf |
|
|
|
| |