SLIM21

Sort Order Display Format Items / Page  
 
  Click the serial number on the left to view the details of the item.
 #  AuthorTitleAccn#YearItem Type Claims
1 Jahankhani, Hamid Wireless Networks I12814 2023 eBook  
2 Jahankhani, Hamid AI, Blockchain and Self-Sovereign Identity in Higher Education I12743 2023 eBook  
3 Abaimov, Stanislav Machine Learning for Cyber Agents I12486 2022 Book  
4 Wolf, Ramona Quantum Key Distribution I11775 2021 eBook  
5 Grasselli, Federico Quantum Cryptography I11706 2021 eBook  
(page:1 / 1) [#5]     

1.    
No image available
TitleWireless Networks : Cyber Security Threats and Countermeasures
Author(s)Jahankhani, Hamid;El Hajjar, Ayman
PublicationCham, 1. Imprint: Springer 2. Springer International Publishing, 2023.
DescriptionVI, 348 p. 161 illus., 129 illus. in color : online resource
Abstract NoteIn recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master???s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills
ISBN,Price9783031336317
Keyword(s)1. Computer crimes 2. COMPUTER NETWORKS 3. Cybercrime 4. Data and Information Security 5. Data protection 6. EBOOK - SPRINGER 7. Mobile and Network Security 8. Mobile communication systems 9. Wireless and Mobile Communication 10. Wireless communication systems
Item TypeeBook
Multi-Media Links
media link description
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12814     On Shelf    

2.     
No image available
TitleAI, Blockchain and Self-Sovereign Identity in Higher Education
Author(s)Jahankhani, Hamid;Jamal, Arshad;Brown, Guy;Sainidis, Eustathios;Fong, Rose;Butt, Usman J
PublicationCham, 1. Imprint: Springer 2. Springer Nature Switzerland, 2023.
DescriptionVI, 313 p. 151 illus., 132 illus. in color : online resource
Abstract NoteThis book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning? The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education. The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills
ISBN,Price9783031336270
Keyword(s)1. ARTIFICIAL INTELLIGENCE 2. COMPUTER NETWORKS 3. Data and Information Security 4. Data protection 5. EBOOK - SPRINGER 6. Education, Higher 7. HIGHER EDUCATION 8. Mobile and Network Security
Item TypeeBook
Multi-Media Links
media link description
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12743     On Shelf    

3.     
No image available
TitleMachine Learning for Cyber Agents : Attack and Defence
Author(s)Abaimov, Stanislav;Martellini, Maurizio
PublicationCham, 1. Imprint: Springer 2. Springer International Publishing, 2022.
DescriptionXV, 227 p. 27 illus., 23 illus. in color : online resource
Abstract NoteThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services has been improved, and new tools created. On the other, it entails new cyber threats both through evolved attacking capacities and through its own imperfections and vulnerabilities. Moreover, quantum computers are further pushing the boundaries of what is possible, by making machine learning cyber agents faster and smarter. With the abundance of often-confusing information and lack of trust in the diverse applications of AI-based technologies, it is essential to have a book that can explain, from a cyber security standpoint, why and at what stage the emerging, powerful technology of machine learning can and should be mistrusted, and how to benefit from it while avoiding potentially disastrous consequences. In addition, this book sheds light on another highly sensitive area ??? the application of machine learning for offensive purposes, an aspect that is widely misunderstood, under-represented in the academic literature and requires immediate expert attention
ISBN,Price9783030915858
Keyword(s)1. Computer networks???Security measures 2. Data and Information Security 3. Data protection 4. EBOOK 5. EBOOK - SPRINGER 6. MACHINE LEARNING 7. Mobile and Network Security 8. Security Science and Technology 9. Security systems
Item TypeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I12486     On Shelf    

4.     
No image available
TitleQuantum Key Distribution : An Introduction with Exercises
Author(s)Wolf, Ramona
PublicationCham, Springer International Publishing, 2021.
DescriptionXI, 229 p. 56 illus., 31 illus. in color : online resource
Abstract NoteThis textbook introduces the non-specialist reader to the concepts of quantum key distribution and presents an overview of state-of-the-art quantum communication protocols and applications. The field of quantum cryptography has advanced rapidly in the previous years, not least because with the age of quantum computing drawing closer, traditional encryption methods are at risk. The textbook presents the necessary mathematical tools without assuming much background, making it accessible to readers without experience in quantum information theory. In particular, the topic of classical and quantum entropies is presented in great detail. Furthermore, the author discusses the different types of quantum key distribution protocols and explains several tools for proving the security of these protocols. In addition, a number of applications of quantum key distribution are discussed, demonstrating its value to state-of-the-art cryptography and communication. This book leads the reader through the mathematical background with a variety of worked-out examples and exercises. It is primarily targeted at graduate students and advanced undergraduates in theoretical physics. The presented material is largely self-contained and only basic knowledge in quantum mechanics and linear algebra is required
ISBN,Price9783030739911
Keyword(s)1. Data and Information Security 2. Data protection 3. Data structures (Computer science) 4. Data Structures and Information Theory 5. EBOOK 6. EBOOK - SPRINGER 7. INFORMATION THEORY 8. QUANTUM COMMUNICATION 9. Quantum Communications and Cryptography 10. Quantum computing 11. QUANTUM INFORMATION
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I11775     On Shelf    

5.    
No image available
TitleQuantum Cryptography : From Key Distribution to Conference Key Agreement
Author(s)Grasselli, Federico
PublicationCham, Springer International Publishing, 2021.
DescriptionXVII, 152 p. 14 illus. in color : online resource
Abstract NoteRising concerns about the security of our data have made quantum cryptography a very active research field in recent years. Quantum cryptographic protocols promise everlasting security by exploiting distinctive quantum properties of nature. The most extensively implemented protocol is quantum key distribution (QKD), which enables secure communication between two users. The aim of this book is to introduce the reader to state-of-the-art QKD and illustrate its recent multi-user generalization: quantum conference key agreement. With its pedagogical approach that doesn???t disdain going into details, the book enables the reader to join in cutting-edge research on quantum cryptography
ISBN,Price9783030643607
Keyword(s)1. Data and Information Security 2. Data Engineering 3. Data protection 4. EBOOK 5. EBOOK - SPRINGER 6. Engineering???Data processing 7. Information and Communication Technologies (ICT) 8. INFORMATION TECHNOLOGY 9. QUANTUM COMMUNICATION 10. Quantum Communications and Cryptography 11. QUANTUM COMPUTERS 12. Quantum computing 13. QUANTUM INFORMATION 14. Technology???Sociological aspects
Item TypeeBook
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession#  Call#StatusIssued ToReturn Due On Physical Location
I11706     On Shelf    

(page:1 / 1) [#5]