Securing the Digital Frontier (notice n° 1556930)

détails MARC
000 -LEADER
fixed length control field 03675cam a2200277zu 4500
003 - CONTROL NUMBER IDENTIFIER
control field FRCYB88974541
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251020124313.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251020s2025 fr | o|||||0|0|||eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789365899931
035 ## - SYSTEM CONTROL NUMBER
System control number FRCYB88974541
040 ## - CATALOGING SOURCE
Original cataloging agency FR-PaCSA
Language of cataloging en
Transcribing agency
Description conventions rda
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bhardwaj, Akashdeep
245 01 - TITLE STATEMENT
Title Securing the Digital Frontier
Remainder of title Advanced frameworks for social media and IoT threats (English Edition)
Statement of responsibility, etc. ['Bhardwaj, Akashdeep']
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Name of producer, publisher, distributor, manufacturer BPB Publications
Date of production, publication, distribution, manufacture, or copyright notice 2025
300 ## - PHYSICAL DESCRIPTION
Extent p.
336 ## - CONTENT TYPE
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type code c
Source rdamdedia
338 ## - CARRIER TYPE
Carrier type code c
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. Description The explosive growth of interconnected devices and digital platforms has led to cybersecurity becoming a cornerstone of modern technological infrastructure. In an era of AI-driven misinformation and smart IoT vulnerabilities, innovative defense mechanisms are more critical than ever. This book offers a structured and insightful journey through the evolving landscape of cybersecurity, focusing on the pressing challenges posed by social media and IoT ecosystems. Readers explore ML frameworks designed to detect fake news and distorted social media campaigns, followed by methods to identify fake Instagram profiles and prevent impersonation. The discussion advances into technical territory with a threat surface analysis of smart IoT cameras, offering metrics to address their unique vulnerabilities. The book concludes by introducing a novel cryptographic hash function and a comparative analysis of IoT communication protocols. By the end of this book, readers will be well-equipped with the knowledge and practical skills needed to identify, analyze, and mitigate cybersecurity threats across social media and IoT ecosystems. They will gain hands-on expertise in machine learning-based threat detection, firmware analysis, protocol evaluation, and advanced cryptographic techniques, empowering them to build and maintain more secure digital environments. What you will learn ? Understand the core principles of digital security and vulnerabilities in IoT infrastructures. ? Learn to detect fake news, manipulative campaigns, and social media misinformation tactics. ? Perform threat surface analysis of IoT camera systems. ? Learn behavior-based detection of advanced persistent threats. ? Implement an intrusion detection and prevention system. ? Apply taint analysis to detect firmware-level vulnerabilities. ? Introduce unique frameworks to enhance data integrity and resistance to hash-based attacks. ? Evaluate protocols like MQTT and CoAP using anomaly detection. Who this book is for This book is designed for advanced cybersecurity professionals, IoT developers, academic researchers, graduate students, and policymakers. It is ideal for those looking to deepen their understanding of emerging cyber threats and learn practical, research-backed methods to secure digital and IoT ecosystems. Table of Contents 1. Foundations of Securing Digital Ecosystems 2. Fake Social Media News Detection Framework 3. Machine Learning-based Framework Detecting Fake Instagram Profiles 4. Unmasking Smart Device Vulnerabilities 5. Proactive Threat Hunts to Detect Persistence 6. Fortifying Smart Home Internet of Things Security 7. Framework for IoT Security in Smart Cities 8. Security Assessment of IoT Firmware 9. Polynomial-based Secure Hash Design 10. Comparing Internet of Things Communication Protocols
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Bhardwaj, Akashdeep
856 40 - ELECTRONIC LOCATION AND ACCESS
Access method Cyberlibris
Uniform Resource Identifier <a href="https://international.scholarvox.com/netsen/book/88974541">https://international.scholarvox.com/netsen/book/88974541</a>
Electronic format type text/html
Host name

Pas d'exemplaire disponible.

PLUDOC

PLUDOC est la plateforme unique et centralisée de gestion des bibliothèques physiques et numériques de Guinée administré par le CEDUST. Elle est la plus grande base de données de ressources documentaires pour les Étudiants, Enseignants chercheurs et Chercheurs de Guinée.

Adresse

627 919 101/664 919 101

25 boulevard du commerce
Kaloum, Conakry, Guinée

Réseaux sociaux

Powered by Netsen Group @ 2025