語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Human impact on security and privacy...
~
Elngar, Ahmed A.
Human impact on security and privacynetwork and human security, social media, and devices /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Human impact on security and privacyRajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
其他題名:
network and human security, social media, and devices /
其他作者:
Elngar, Ahmed A.
出版者:
Hershey, Pennsylvania :IGI Global,2025.
面頁冊數:
1 online resource (xxv, 377 p.) :ill.
標題:
Computer security.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-9235-5
ISBN:
9798369392379$q(ebook)
Human impact on security and privacynetwork and human security, social media, and devices /
Human impact on security and privacy
network and human security, social media, and devices /[electronic resource] :Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors. - Hershey, Pennsylvania :IGI Global,2025. - 1 online resource (xxv, 377 p.) :ill. - Advances in human and social aspects of technology (AHSAT) book series. - Advances in human and social aspects of technology (AHSAT) book series..
Includes bibliographical references and index.
Preface -- Chapter 1. The Role of Human Factors in Cybersecurity Vulnerabilities -- Chapter 2. Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities -- Chapter 3. Understanding the Human Factors in the Psychology of Cyber Threats -- Chapter 4. Comparative Analysis of Traditional vs. AI-Driven Network Security -- Chapter 5. Cyber Physical System for Enhancement in Security While Using Cyber -- Chapter 6. Key Logger and Prevention of Security Breaches -- Chapter 7. Security Considerations of SDN Networks During DDoS Attacks in Load Balancing -- Chapter 8. Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning: Legal Standpoints on Progressive Data Analytics -- Chapter 9. A Security and Privacy Validation Methodology for E-Health Systems Using Cloud Storage -- Chapter 10. Improving the Quality of the Face Recognition Using LBPH in Machine Learning -- Chapter 11. Kinship Verification by Analysing Facial Images to Ensure Human Security -- Chapter 12. Exploring the Social Model of Smart Home Devices: An In-Depth Analysis of Social Impact and Security Issues -- Chapter 13. Social Media Revolution: Unravelling the Threads of Connectivity and Influence -- Chapter 14. Cyber Security Concerns in Social Media and Online Interactions -- Chapter 15. Theoretical Insights Into User Security and Privacy in Social Media Environments -- Compilation of References -- About the Contributors -- Index.
"In an era defined by rapid technological advancements and an increasingly interconnected world, the challenges and opportunities presented by digitalization demand a new approach. The digital world, characterized by optimized, sustainable, and digitally networked solutions, necessitates the integration of intelligence systems, machine learning, deep learning, blockchain methods, and robust cybersecurity measures. Understanding these complex challenges and adapting the synergistic utilization of cutting-edge technologies are becoming increasingly necessary. Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices provides a global perspective on current and future trends concerning the integration of intelligent systems with cybersecurity applications. It offers a comprehensive exploration of ethical considerations within the realms of security, artificial intelligence, agriculture, and data science. Covering topics such as the evolving landscape of cybersecurity, social engineering perspectives, and algorithmic transparency, this publication is particularly valuable for researchers, industry professionals, academics, and policymakers in fields such as agriculture, cybersecurity, AI, data science, computer science, and ethics."--
Mode of access: World Wide Web.
ISBN: 9798369392379$q(ebook)Subjects--Topical Terms:
184416
Computer security.
Subjects--Index Terms:
Cloud Storage.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: QA76.9.A25 / H86 2025eb
Dewey Class. No.: 005.8
Human impact on security and privacynetwork and human security, social media, and devices /
LDR
:04686nmm a2200553 a 4500
001
681633
006
m o d
007
cr nn |||muauu
008
251124s2025 paua ob 001 0 eng d
020
$a
9798369392379$q(ebook)
020
$z
9798369392355$q(hardback)
035
$a
(CaBNVSL)slc00006946
035
$a
(OCoLC)1463450436
035
$a
00354882
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
H86 2025eb
082
0 4
$a
005.8
$2
23
245
0 0
$a
Human impact on security and privacy
$h
[electronic resource] :
$b
network and human security, social media, and devices /
$c
Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
2025.
300
$a
1 online resource (xxv, 377 p.) :
$b
ill.
490
1
$a
Advances in human and social aspects of technology (AHSAT) book series
504
$a
Includes bibliographical references and index.
505
0
$a
Preface -- Chapter 1. The Role of Human Factors in Cybersecurity Vulnerabilities -- Chapter 2. Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities -- Chapter 3. Understanding the Human Factors in the Psychology of Cyber Threats -- Chapter 4. Comparative Analysis of Traditional vs. AI-Driven Network Security -- Chapter 5. Cyber Physical System for Enhancement in Security While Using Cyber -- Chapter 6. Key Logger and Prevention of Security Breaches -- Chapter 7. Security Considerations of SDN Networks During DDoS Attacks in Load Balancing -- Chapter 8. Exploring Effective Strategies for Combatting Cybercrime and Intersection of IoT, Deep Learning: Legal Standpoints on Progressive Data Analytics -- Chapter 9. A Security and Privacy Validation Methodology for E-Health Systems Using Cloud Storage -- Chapter 10. Improving the Quality of the Face Recognition Using LBPH in Machine Learning -- Chapter 11. Kinship Verification by Analysing Facial Images to Ensure Human Security -- Chapter 12. Exploring the Social Model of Smart Home Devices: An In-Depth Analysis of Social Impact and Security Issues -- Chapter 13. Social Media Revolution: Unravelling the Threads of Connectivity and Influence -- Chapter 14. Cyber Security Concerns in Social Media and Online Interactions -- Chapter 15. Theoretical Insights Into User Security and Privacy in Social Media Environments -- Compilation of References -- About the Contributors -- Index.
520
3
$a
"In an era defined by rapid technological advancements and an increasingly interconnected world, the challenges and opportunities presented by digitalization demand a new approach. The digital world, characterized by optimized, sustainable, and digitally networked solutions, necessitates the integration of intelligence systems, machine learning, deep learning, blockchain methods, and robust cybersecurity measures. Understanding these complex challenges and adapting the synergistic utilization of cutting-edge technologies are becoming increasingly necessary. Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices provides a global perspective on current and future trends concerning the integration of intelligent systems with cybersecurity applications. It offers a comprehensive exploration of ethical considerations within the realms of security, artificial intelligence, agriculture, and data science. Covering topics such as the evolving landscape of cybersecurity, social engineering perspectives, and algorithmic transparency, this publication is particularly valuable for researchers, industry professionals, academics, and policymakers in fields such as agriculture, cybersecurity, AI, data science, computer science, and ethics."--
$c
Provided by publisher.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer security.
$3
184416
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computational intelligence.
$3
210824
650
0
$a
Internet governance.
$2
fast
$3
688793
653
$a
Cloud Storage.
653
$a
Cyber Threats.
653
$a
Cyber-Physical Systems.
653
$a
Cybersecurity Vulnerabilities.
653
$a
DDoS Attacks.
653
$a
Deep Learning.
653
$a
Enhancing Security in Cyber Environments.
653
$a
Face Recognition.
653
$a
Human Factors.
653
$a
Intersection of IoT.
653
$a
Keyloggers.
653
$a
Kinship Verification.
653
$a
Legal Standpoints.
653
$a
Load Balancing.
653
$a
Machine Learning.
653
$a
Prevention of Security Breaches.
653
$a
Privacy Validation Methodology.
653
$a
Psychology.
653
$a
SDN Networks.
653
$a
Smart Home Devices.
653
$a
Social Media.
653
$a
User Security.
655
4
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Elngar, Ahmed A.
$3
976738
700
1
$a
Srivastava, Saurabh.
$3
995215
700
1
$a
Kumar, Rajeev.
$3
737242
710
2
$a
IGI Global.
$3
529832
776
0 8
$i
Print version:
$z
9798369392355
830
0
$a
Advances in human and social aspects of technology (AHSAT) book series.
$3
994922
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-9235-5
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000254722
電子館藏
1圖書
電子書
EB QA76.9.A25 H86 2025eb 2025
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/979-8-3693-9235-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入