Description
Book SynopsisThis book provides an essential compilation of relevant and cutting edge academic and industry work on key cybersecurity applications topics. Further, it introduces cybersecurity applications to the public at large to develop their cybersecurity applications knowledge and awareness. The book concentrates on a wide range of advances related to Cybersecurity Applications which include, among others, applications in the areas of Data Science, Internet of Things, Artificial Intelligence, Robotics, Web, High-Tech Systems, Cyber-Physical Systems, Mobile Devices, Digital Media, and Cloud Computing. It introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity application specialists and educators for keeping current their cybersecurity applications knowledge. Further, it provides a glimpse of future directions where cybersecurity applications are headed. The book can be a valuable resource to applied cybersecurity experts towards their professional development efforts and to students as a supplement to their cybersecurity courses.
Table of Contents1. Introduction2. Cybersecurity Applications in Data Science3. Cybersecurity Applications in Internet of Things4. Cybersecurity Applications in Artificial Intelligence5. Cybersecurity Applications in Robotics6. Cybersecurity Applications in Web7. Cybersecurity Applications in High-Tech Systems8. Cybersecurity Applications in Cyber-Physical Systems9. Cybersecurity Applications in Mobile Devices10. Cybersecurity Applications in Digital Media11. Cybersecurity Applications in Cloud Computing12. Cybersecurity Applications in Distributed Systems13. Cybersecurity Applications in Vehicles14. Cybersecurity Applications in Supply Chain15. Cybersecurity Applications in Trustworthy Computing16. Cybersecurity Applications in Databases17. Cybersecurity Applications in Operating Systems18. Cybersecurity Applications in Software19. Cybersecurity Applications in Virtualization20. Cybersecurity Applications in Biometrics21. Cybersecurity Applications in Education22. Cybersecurity Applications in Blockchains23. Conclusion.