Soorena Merat, Wahab Almuhtadi
Social Cyber Engineering and Advanced Security Algorithms (eBook, ePUB)
124,95 €
124,95 €
inkl. MwSt.
Erscheint vor. 30.05.25
62 °P sammeln
124,95 €
Als Download kaufen
124,95 €
inkl. MwSt.
Erscheint vor. 30.05.25
62 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
124,95 €
inkl. MwSt.
Erscheint vor. 30.05.25
Alle Infos zum eBook verschenken
62 °P sammeln
Unser Service für Vorbesteller - Ihr Vorteil ohne Risiko:
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Sollten wir den Preis dieses Artikels vor dem Erscheinungsdatum senken, werden wir Ihnen den Artikel bei der Auslieferung automatisch zum günstigeren Preis berechnen.
Soorena Merat, Wahab Almuhtadi
Social Cyber Engineering and Advanced Security Algorithms (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development and emphasizes the role of quantum computing in revolutionizing factorization approaches.
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 6.16MB
Andere Kunden interessierten sich auch für
- Ke HuangDesign and Analysis of Cryptographic Algorithms in Blockchain (eBook, ePUB)49,95 €
- Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (eBook, ePUB)50,95 €
- Rakesh NayakData Structures for Engineers and Scientists Using Python (eBook, ePUB)170,95 €
- Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (eBook, ePUB)108,95 €
- Tyler Justin SpeedAsset Protection through Security Awareness (eBook, ePUB)60,95 €
- Cloud Computing Security (eBook, ePUB)63,95 €
- Preeti MishraCloud Security (eBook, ePUB)50,95 €
-
-
-
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development and emphasizes the role of quantum computing in revolutionizing factorization approaches.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 30. Mai 2025
- Englisch
- ISBN-13: 9781040348086
- Artikelnr.: 73876849
- Verlag: Taylor & Francis eBooks
- Erscheinungstermin: 30. Mai 2025
- Englisch
- ISBN-13: 9781040348086
- Artikelnr.: 73876849
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Soorena Merat is the Chief Cyber Security Officer at Silkatech Consulting Engineers Inc. With over three decades of experience in the technology industry, Dr. Merat brings unwavering commitment and a deep understanding of the ever-shifting cybersecurity landscape. His research focuses on the fascinating intersection of bioneural systems, artificial intelligence, and social cyber engineering. Dr. Merat's work delves into the intricate dynamics of human behavior within technological environments, exploring how vulnerabilities emerge and how they can be proactively addressed. He is particularly interested in developing predictive models that identify potential weaknesses in systems and generating actionable recommendations for enhanced security controls. This research combines insights from neuroscience, cognitive psychology, and computer science to create a more holistic approach to cybersecurity. Driven by a passion for innovation and a commitment to excellence, Dr. Merat's journey in the tech industry is marked by a continuous pursuit of knowledge. He remains at the forefront of advancements in the field, ensuring that his expertise and insights contribute to a safer and more secure digital world.
Dr. Wahab Almuhtadi has over 33 years of industry experience, concurrently over 27 years of university teaching experience. He is Professor/Coordinator of "Optical Systems and Sensors" Program, Algonquin College/Carleton University, Canada. He is Research Council Member, Digital Research Alliance of Canada. Previously, he was Senior System Engineer at Nortel, Optical Solutions R&D. With his professional background, he demonstrated outstanding leadership establishing Applied Research with $10.5M fund that fostered Algonquin College to become Polytechnic Institution. He is the founder of the $6 million cutting-edge Optophotonics Lab (Optical Communications Network) 200Gbps. He is one of the founders of Ontario's Centre of Excellence in Next Generation Networks (CENGN) with $65 million in funding. His expertise is in photonics, optical systems and sensors, optical communications, and wireless. He has published several technical papers and books. He received several awards from IEEE, academia, and industry, e.g., 2010 IEEE Leadership Award, 2015 IEEE Canada W.R. Service Award, 2009 Laurent Isabelle Teaching Excellence, 2006 NISOD Award, and 2015 Canadian Pacific Railway Engineering Medal, Engineering Institute of Canada-EIC. He is P.Eng. and EIC Fellow. Dr. Almuhtadi is actively involved in IEEE for over 29 years serving in many executive level posts across IEEE. He is also currently the President-Elect/Director-Elect (2024-2025) of IEEE Canada/Region 7. IEEE President of IEEE Consumer Technology Society (CTSoc).
Dr. Wahab Almuhtadi has over 33 years of industry experience, concurrently over 27 years of university teaching experience. He is Professor/Coordinator of "Optical Systems and Sensors" Program, Algonquin College/Carleton University, Canada. He is Research Council Member, Digital Research Alliance of Canada. Previously, he was Senior System Engineer at Nortel, Optical Solutions R&D. With his professional background, he demonstrated outstanding leadership establishing Applied Research with $10.5M fund that fostered Algonquin College to become Polytechnic Institution. He is the founder of the $6 million cutting-edge Optophotonics Lab (Optical Communications Network) 200Gbps. He is one of the founders of Ontario's Centre of Excellence in Next Generation Networks (CENGN) with $65 million in funding. His expertise is in photonics, optical systems and sensors, optical communications, and wireless. He has published several technical papers and books. He received several awards from IEEE, academia, and industry, e.g., 2010 IEEE Leadership Award, 2015 IEEE Canada W.R. Service Award, 2009 Laurent Isabelle Teaching Excellence, 2006 NISOD Award, and 2015 Canadian Pacific Railway Engineering Medal, Engineering Institute of Canada-EIC. He is P.Eng. and EIC Fellow. Dr. Almuhtadi is actively involved in IEEE for over 29 years serving in many executive level posts across IEEE. He is also currently the President-Elect/Director-Elect (2024-2025) of IEEE Canada/Region 7. IEEE President of IEEE Consumer Technology Society (CTSoc).
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems