|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Onwubiko, Cyril |
Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media |
I12867 |
2023 |
eBook |
|
2 |
Jahankhani, Hamid |
Wireless Networks |
I12814 |
2023 |
eBook |
|
3 |
Masys, Anthony J |
Handbook of Security Science |
I12218 |
2022 |
Book |
|
4 |
Visvizi, Anna |
Artificial Intelligence and Its Contexts |
I11916 |
2021 |
eBook |
|
|
1.
|
|
Title | Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2022; 20???21 June; Wales |
Author(s) | Onwubiko, Cyril;Rosati, Pierangelo;Rege, Aunshul;Erola, Arnau;Bellekens, Xavier;Hindy, Hanan;Jaatun, Martin Gilje |
Publication | Singapore, 1. Imprint: Springer
2. Springer Nature Singapore, 2023. |
Description | XXVI, 476 p. 113 illus., 97 illus. in color : online resource |
Abstract Note | This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters ???Municipal Cybersecurity???A Neglected Research Area? A Survey of Current Research", "The Transnational Dimensionof Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes??? are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com |
ISBN,Price | 9789811964145 |
Keyword(s) | 1. ARTIFICIAL INTELLIGENCE
2. Blockchain
3. Blockchains (Databases)
4. COMPLEX SYSTEMS
5. Computer crimes
6. Cooperating objects (Computer systems)
7. Cyber-Physical Systems
8. Cybercrime
9. EBOOK - SPRINGER
10. Security Science and Technology
11. Security systems
12. SYSTEM THEORY
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12867 |
|
|
On Shelf |
|
|
|
|
2.
|
|
Title | Wireless Networks : Cyber Security Threats and Countermeasures |
Author(s) | Jahankhani, Hamid;El Hajjar, Ayman |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2023. |
Description | VI, 348 p. 161 illus., 129 illus. in color : online resource |
Abstract Note | In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master???s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills |
ISBN,Price | 9783031336317 |
Keyword(s) | 1. Computer crimes
2. COMPUTER NETWORKS
3. Cybercrime
4. Data and Information Security
5. Data protection
6. EBOOK - SPRINGER
7. Mobile and Network Security
8. Mobile communication systems
9. Wireless and Mobile Communication
10. Wireless communication systems
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12814 |
|
|
On Shelf |
|
|
|
|
3.
|
|
Title | Handbook of Security Science |
Author(s) | Masys, Anthony J |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2022. |
Description | 97 illus., 58 illus. in color. eReference : online resource |
Abstract Note | This handbook offers insights into how science (physical, natural and social) and technology can support new developments to manage the complexity resident within the threat and risk landscape. The security landscape can be described as dynamic and complex stemming from the emerging threats and risks that are both persistent and transborder. Globalization, climate change, terrorism, transnational crime can have significant societal impact and forces one to re-evaluate what ???national security??? means. Recent global events such as mass migration, terrorist acts, pandemics and cyber threats highlight the inherent vulnerabilities in our current security posture. As an interdisciplinary body of work, the Handbook of Security Science captures concepts, theories and security science applications, thereby providing a survey of current and emerging trends in security. Through an evidence-based approach, the collection of chapters in the book delivers insightful and comprehensive articulation of the problem and solution space associated with the complex security landscape. In so doing the Handbook of Security Science introduces scientific tools and methodologies to inform security management, risk and resilience decision support systems; insights supporting design of security solutions; approaches to threat, risk and vulnerability analysis; articulation of advanced cyber security solutions; and current developments with respect to integrated computational and analytical solutions that increase our understanding of security physical, social, economic, and technological interrelationships and problem space |
ISBN,Price | 9783319918754 |
Keyword(s) | 1. Computer crimes
2. Crime Control and Security
3. Criminology
4. Cybercrime
5. EBOOK
6. EBOOK - SPRINGER
7. Environmental sciences???Social aspects
8. Environmental Social Sciences
9. International Security Studies
10. Military and Defence Studies
11. Politics and war
12. Security Science and Technology
13. Security systems
14. Security, International
|
Item Type | Book |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12218 |
|
|
On Shelf |
|
|
|
|
4.
| |
Title | Artificial Intelligence and Its Contexts : Security, Business and Governance |
Author(s) | Visvizi, Anna;Bodziany, Marek |
Publication | Cham, Springer International Publishing, 2021. |
Description | VIII, 240 p. 31 illus., 13 illus. in color : online resource |
Abstract Note | This book offers a comprehensive approach to the question of how artificial intelligence (AI) impacts politics, economy, and the society today. In this view, it is quintessential for understanding the complex nature of AI and its role in today???s world. The book has been divided into three parts. Part one is devoted to the question of how AI will be used for security and defense purposes, including combat in war zones. Part two looks at the value added of AI and machine learning for decision-making in the fields of politics and business. Part three consists of case studies???covering the EU, the USA, Saudi Arabia, Portugal, and Poland???that discuss how AI is being used in the realms of politics, security and defense. The discussion in the book opens with the question of the nature of AI, as well as of ethics and the use of AI in combat. Subsequently, the argument covers issues as diverse as the militarization of AI, the use of AI in strategic studies and military strategy design. These topics are followed by an insight into AI and strategic communication (StratCom), including disinformation, as well as into AI and finance. The case-studies included in part 3 of the book offer a captivating overview of how AI is being employed to stimulate growth and development, to promote data- and evidence-driven policy-making, to enable efficient and inclusive digital transformation and other related issues. Written by academics and practitioners in an academically sound, yet approachable manner, this volume queries issues and topics that form the thrust of processes that transform world politics, economics and society. As such, this volume will serve as the primer for students, researchers, lectures and other professionals who seek to understand and engage with the variety of issues AI implicates |
ISBN,Price | 9783030889722 |
Keyword(s) | 1. ARTIFICIAL INTELLIGENCE
2. Computer crimes
3. Cybercrime
4. EBOOK
5. EBOOK - SPRINGER
6. Security Science and Technology
7. Security systems
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11916 |
|
|
On Shelf |
|
|
|
| |