- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development and emphasizes the role of quantum computing in revolutionizing factorization approaches.
Andere Kunden interessierten sich auch für
- Joe GrayPractical Social Engineering20,99 €
- Digital Forensics and Cyber Crime38,99 €
- Machine Learning for Cyber Security38,99 €
- Advances in Cyber Security90,99 €
- Machine Learning for Cyber Security75,99 €
- Machine Learning for Cyber Security90,99 €
- Craig SmithThe Car Hacker's Handbook29,99 €
-
-
-
This book delves into the interplay between algorithm design, quantum computing, human behavior, and the evolving landscape of cybersecurity regulation. It highlights the evolution in cybersecurity driven by breakthroughs in algorithmic development and emphasizes the role of quantum computing in revolutionizing factorization approaches.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 364
- Erscheinungstermin: 30. Mai 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 870g
- ISBN-13: 9781032816449
- ISBN-10: 1032816449
- Artikelnr.: 72489438
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 364
- Erscheinungstermin: 30. Mai 2025
- Englisch
- Abmessung: 234mm x 156mm
- Gewicht: 870g
- ISBN-13: 9781032816449
- ISBN-10: 1032816449
- Artikelnr.: 72489438
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Soorena Merat is the Chief Cyber Security Officer at Silkatech Consulting Engineers Inc. With over three decades of experience in the technology industry, Dr. Merat brings unwavering commitment and a deep understanding of the ever-shifting cybersecurity landscape. His research focuses on the fascinating intersection of bioneural systems, artificial intelligence, and social cyber engineering. Dr. Merat's work delves into the intricate dynamics of human behavior within technological environments, exploring how vulnerabilities emerge and how they can be proactively addressed. He is particularly interested in developing predictive models that identify potential weaknesses in systems and generating actionable recommendations for enhanced security controls. This research combines insights from neuroscience, cognitive psychology, and computer science to create a more holistic approach to cybersecurity. Driven by a passion for innovation and a commitment to excellence, Dr. Merat's journey in the tech industry is marked by a continuous pursuit of knowledge. He remains at the forefront of advancements in the field, ensuring that his expertise and insights contribute to a safer and more secure digital world. Dr. Wahab Almuhtadi has over 33 years of industry experience, concurrently over 27 years of university teaching experience. He is Professor/Coordinator of "Optical Systems and Sensors" Program, Algonquin College/Carleton University, Canada. He is Research Council Member, Digital Research Alliance of Canada. Previously, he was Senior System Engineer at Nortel, Optical Solutions R&D. With his professional background, he demonstrated outstanding leadership establishing Applied Research with $10.5M fund that fostered Algonquin College to become Polytechnic Institution. He is the founder of the $6 million cutting-edge Optophotonics Lab (Optical Communications Network) 200Gbps. He is one of the founders of Ontario's Centre of Excellence in Next Generation Networks (CENGN) with $65 million in funding. His expertise is in photonics, optical systems and sensors, optical communications, and wireless. He has published several technical papers and books. He received several awards from IEEE, academia, and industry, e.g., 2010 IEEE Leadership Award, 2015 IEEE Canada W.R. Service Award, 2009 Laurent Isabelle Teaching Excellence, 2006 NISOD Award, and 2015 Canadian Pacific Railway Engineering Medal, Engineering Institute of Canada-EIC. He is P.Eng. and EIC Fellow. Dr. Almuhtadi is actively involved in IEEE for over 29 years serving in many executive level posts across IEEE. He is also currently the President-Elect/Director-Elect (2024-2025) of IEEE Canada/Region 7. IEEE President of IEEE Consumer Technology Society (CTSoc).
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems
Perspective Chapter 2 Individual Cybersecurity in the Era of Digital
Computing and the Internet Chapter 3 Individual Security in the Era of
Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic
Insights into the Nexus of Interpersonal Mental Challenges and Social
Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical
Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking
on the Rise of Social Engineering Attacks Chapter 7 Influence of
Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence
of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9
Influence of Aging on the Rise of Social Engineering Attacks Chapter 10
Influence of Depression and Anxiety on the Rise of Social Engineering
Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of
Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the
Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer's,
Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14
Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15
Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16
Mind Games in the Digital Playground: The Rising Threat of Social
Engineering in Online Gaming and the Technological Challenges in Detection
Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual
Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its
Impact on Social and Interpersonal Trust Chapter 20 Navigating the
Intersection of Digital Marketing, Intelligent Advertising with
Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal
Trust, Escalating Social Engineering Risks, and the Technological
Challenges in Detection Chapter 22 A Brief Overview of the Benefits of
Implementing Quantum Algorithms in Factorizing Cyber Social Engineering
Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum
Applications in Factorizing Cyber Social Engineering Threats Chapter 24
Introduction to Hybrid Structures of the Quantum Probability Theory in
Social Engineering Chapter 25 Introduction to the Quantum Structures of the
Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to
Quantum Logic and Automata Theory in Cyber Social Engineering Systems
Chapter 27 Introduction to Quantum Parallelism and Classical Computation in
Cyber Social Engineering Systems