Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Challenges in the IoT and Smart Environments (eBook)

A Practitioners' Guide to Security, Ethics and Criminal Threats
eBook Download: PDF
2021 | 1st ed. 2021
VI, 320 Seiten
Springer International Publishing (Verlag)
978-3-030-87166-6 (ISBN)

Lese- und Medienproben

Challenges in the IoT and Smart Environments -
Systemvoraussetzungen
160,49 inkl. MwSt
(CHF 156,80)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book is an invaluable reference for those operating within the fields of Cyber Security, Digital Forensics, Digital Policing, Computer Science and Artificial Intelligence. The Internet of Things (IoT) ecosystem presents a wide range of consumer, infrastructure, organisational, industrial and military applications. The IoT technologies such as intelligent health-connected devices; unmanned aerial vehicles (UAVs); smart grids; cyber-physical and cyber-biological systems; and the Internet of Military/Battlefield Things offer a myriad of benefits both individually and collectively. For example, implantable devices could be utilised to save or enhance patients' lives or offer preventative treatments. However, notwithstanding its many practical and useful applications, the IoT paradigm presents numerous challenges spanning from technical, legal and investigative issues to those associated with security, privacy and ethics.

 

Written by internationally-renowned experts in the field, this book aims to contribute to addressing some of these challenges. Lawyers, psychologists and criminologists could also find this book a very valuable resource at their disposal, and technology enthusiasts might find the book interesting. Furthermore, the book is an excellent advanced text for research and master's degree students as well as undergraduates at their final years of studies in the stated fields.



Dr. Reza Montasari is Senior Lecturer in Cyber Threats at the Hillary Rodham Clinton School of Law. Reza's main research interests lie in the areas of Digital Forensics and Cyber Security but also include Cyber Law and Cyber Terrorism. Reza has authored numerous journal articles, conference papers, book chapters, media articles and recently co-edited a volume (with Springer) entitled 'Digital Forensic Investigation of Internet of Things (IoT) Devices'. He frequently presents at various conferences including the annual International Conference on Global Security, Safety & Sustainability (ICGS3). Reza has also given a number of invited talks including his recent presentation at the College of Policing and The Investigator Spring National Digital Media Investigator's (DMI) Conference (Oxford, UK, 2019). Reza serves as Editorial Board Member, Programme Steering Committee Member, and Reviewer for a number of leading international journals and conferences in the fields of Digital Forensics and Cyber Security. He has previously worked with a number of UK police forces. Reza is also Guest Writer for Today's Legal Cyber Risk to provide advice on the latest Cyber Security issues.

 

Professor Hamid Jahankhani has taught at both the undergraduate and postgraduate level, full and part-time and supervised and examined research students at the M.Phil., Ph.D. levels, and Doctorate in Professional Studies (D.Prof.). Hamid's teaching has covered a broad range of computing modules in particular Information Security Management, Information Security Risk and Audit, Digital Forensics, Systems Design & Development, Telecommunications and Networking, Computer Systems. Hamid's principal research area for a number of years has been in the field of information security management and digital forensics.

 

Dr. Haider al-Khateeb holds a position as Reader in Cyber Security and Deputy Director of the Wolverhampton Cyber Research Institute (WCRI) at the University of Wolverhampton. He is Senior Fellow of the Higher Education Academy (SFHEA), with a first-class B.Sc. (Hons) in Computer Science, and Ph.D. in Cyber Security. His role includes leading R&D projects, consultancy, knowledge exchange & research impact including instrumental, conceptual, and capacity building. With over 12 years in the UK's HE sector, he has been invited to talk at various international events, has proven track record of publications, delivered multi-disciplinary projects, and worked with SMEs to launch new innovative products. Haider has delivered a range of both theory-based and hands-on technical training on topics such as Ethical Hacking, Incident Response, Risk Management and Assurance Methodologies, and Information Governance. He has long experience with Transnational Education (TNE) and Executive Master's degrees in Cyber Security through universities as well as leading IT training providers in the UK such as QA Ltd. Haider has also worked on the NCSC's CyberFirst initiative, a pivotal part of the UK government's National Cyber Security Programme to develop the UK's next generation of cyber professionals. As a security researcher, Haider is actively engaged with the latest trends on Distributed Digital Forensics, Cyber Resilience, Cyber Threat Intelligence (CTI), and Online Safety for vulnerable groups. His interest in a broad range of collaborative activities has led to work with national and international researchers to achieve impact, publish in leading journals and to write proposals addressing funding calls, in total he has assisted in the generation of over £1.3m. His quality work has attracted various awards such as best conference papers, teaching awards and university achievement awards.

Erscheint lt. Verlag 26.11.2021
Reihe/Serie Advanced Sciences and Technologies for Security Applications
Advanced Sciences and Technologies for Security Applications
Zusatzinfo VI, 320 p. 104 illus., 89 illus. in color.
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Schlagworte Aerial Vehicle Forensics • Artificial Intelligence • cyber ethics • cyber security • Cyber threat intelligence • Deep learning • digital forensics • Ethical Hacking • Information Security • IoT Device Forensics • Law enforcement • machine learning • Network Security
ISBN-10 3-030-87166-5 / 3030871665
ISBN-13 978-3-030-87166-6 / 9783030871666
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,8 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
CHF 41,95
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
CHF 48,75