home libri books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

thakur kutub; pathan al-sakib khan; ismat sadia - emerging ict technologies and cybersecurity

Emerging ICT Technologies and Cybersecurity From AI and ML to Other Futuristic Technologies

; ;




Disponibilità: solo 1 copia disponibile, compra subito!

Se ordini entro 12 ore e 20 minuti, consegna garantita in 48 ore lavorative
scegliendo le spedizioni Express



PREZZO
93,70 €
NICEPRICE
89,01 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 04/2023
Edizione: 1st ed. 2023





Trama

This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity.

This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.





Sommario

Chapter 01 – An Overview of ICT Technology Advancement ..................................................................... 16

Introduction ............................................................................................................................................ 17

An Overview of ICT Advanced Technologies ........................................................................................... 18

Main Areas of ICT Technologies .............................................................................................................. 19

Hardware Technologies .......................................................................................................................... 20

Data Processing Hardware .................................................................................................................. 20

Data Input Hardware .......................................................................................................................... 22

Data Output Hardware ....................................................................................................................... 23

Data Transmission Hardware .............................................................................................................. 23

Data storage hardware ....................................................................................................................... 24

Software Technologies ............................................................................................................................ 25

Firmware 25

Operating Systems (OSs) ..................................................................................................................... 26

IT Protocols ......................................................................................................................................... 28

Programming Languages ..................................................................................................................... 29

Software Development Methodologies .............................................................................................. 30

Evolution of Information Technology ..................................................................................................... 31

Computer Generations ........................................................................................................................... 32

Zero Generation (1642 – 1945) ........................................................................................................... 32

First Generation (1945 – 1954) ........................................................................................................... 33

Second Generation (1954 – 1963) ...................................................................................................... 33

Third Generation (1963 – 1973) .......................................................................................................... 33

Fourth Generation (1973 – 1985) ....................................................................................................... 33

Fifth Generation (1985 – Present) ...................................................................................................... 33

Operating System Generations ............................................................................................................... 34

First Generation (1940 – 1950) ........................................................................................................... 34

Second Generation (1955 – 1965) ...................................................................................................... 34

Third Generation (1965 – 1980) .......................................................................................................... 35

Fourth Generation (1980 – Present) ................................................................................................... 35

Application Software Generations .......................................................................................................... 35

First Generation .................................................................................................................................. 36

Second Generation ............................................................................................................................. 36

Third Generation ................................................................................................................................. 36

Fourth Generation .............................................................................................................................. 37

Fifth Generation .................................................................................................................................. 37

Programming Language Generations ..................................................................................................... 37

First Generation .................................................................................................................................. 38

Second Generation ............................................................................................................................. 38

Third Generation ................................................................................................................................. 38

Fourth Generation .............................................................................................................................. 39

Fifth Generation .................................................................................................................................. 39

Wireless/Cellular Technology Generations............................................................................................. 39

Zero Generation .................................................................................................................................. 40

First Generation .................................................................................................................................. 40

Second Generation ............................................................................................................................. 40

Third Generation ................................................................................................................................. 41

Fourth Generation .............................................................................................................................. 41

Fifth Generation .................................................................................................................................. 41

WWW Generations ................................................................................................................................. 42

Web 1.0 42

Web 2.0 42

Web 3.0 43

Web 4.0 43

Evolution of Storage Technologies ......................................................................................................... 44

Initial Storage Technologies ................................................................................................................ 44

Magnetic Tape-Based Technologies ................................................................................................... 44

Magnetic Disk-Based Technologies ..................................................................................................... 45

Semiconductor-Based Storage Technologies ......................................................





Autore

Kutub Thakur, Ph.D., is Director of the NJCU Center for Cybersecurity, Assistant Professor, and Director of the Cybersecurity Program at New Jersey City University. He worked for various private and public entities such as the United Nations, New York University, Lehman Brothers, Barclays Capital, ConEdison, City University of New York, and Metropolitan Transport Authority. He received his Ph.D. in Computer Science with a specialization in cybersecurity from Pace University, New York, M.S. in Engineering Electrical and Computer Control systems from the University of Wisconsin, B.S. and A.A.S. in Computer Systems Technology from the City University of New York (CUNY). He reviewed for many prestigious journals and published several papers in reputable journals and conferences. His research interests include digital forensics, network security, machine learning, IoT security, privacy, and user behavior. Dr. Thakur is currently serving as Program Chair for many conferences and workshops. He is also currently supervising many graduate and doctoral students for their theses, proposals, and dissertations in the field of cybersecurity.

Al-Sakib Khan Pathan is Professor at the CSE department, United International University (UIU), Bangladesh. He received his Ph.D. in Computer Engineering in 2009 from Kyung Hee University, South Korea, and his B.Sc. in Computer Science and Information Technology from the Islamic University of Technology (IUT), Bangladesh, in 2003. In his academic career so far, he worked as Faculty Member in the CSE Department at the Independent University, Bangladesh (2020-2021), Southeast University, Bangladesh (2015-2020), Computer Science Department, International Islamic University Malaysia (IIUM), Malaysia, during 2010-2015; at BRACU, Bangladesh, during 2009-2010; and at NSU, Bangladesh, during 2004-2005. He has served as General Chair, Organizing Committee Member, and Technical Program Committee Member in numerous international conferences/workshops like INFOCOM, GLOBECOM, ICC, etc. He was awarded the IEEE Outstanding Leadership Award for his role in the IEEE GreenCom’13 conference. Among various editorial roles, he is currently serving as Editor-in-Chief of the International Journal of Computers and Applications, T&F; Associate Editor of Connection Science, T&F; Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers; Guest Editor of many special issues of top-ranked journals; and Editor/Author of 32 books. He is Senior Member of IEEE.

Sadia Ismat has been serving government agencies for the last two decades. She has held multiple executive positions. Currently, she is working as Chief Information Security Officer (CISO) at the Department of Finance, New York City's largest financial municipal agency which has a collective revenue annually of 65 billion dollars. Dr. Sadia has worked for various state and city agencies, providing consulting services to government and private firms throughout her career. She is Regular Contributor and Speaker in Cybersecurity Conferences discussing Cybersecurity and Women in Cybersecurity. Dr. Ismat published research works encompassing federal compliance and biometric technology. She also works as Adjunct Professor at various city and private universities.











Altre Informazioni

ISBN:

9783031277641

Condizione: Nuovo
Dimensioni: 235 x 155 mm Ø 623 gr
Formato: Copertina rigida
Illustration Notes:XXIV, 277 p. 46 illus., 38 illus. in color.
Pagine Arabe: 277
Pagine Romane: xxiv


Dicono di noi