Cybersecurity Unlocked
-
Edited by:
Bhanu Chander
, A. Ravi and Kumar A. Santhos
About this book
As cyber threats grow in sophistication and scale, the demand for advanced security knowledge has never been greater. This book delivers an in-depth examination of critical domains in modern cybersecurity, including network security, advanced cryptography, IoT and cloud security, AI and ML in defense strategies, next-generation threat intelligence, and zero-knowledge proofs.
Bridging theory with practice, it serves as both an academic reference and a practical guide. Researchers will find cutting-edge insights for further exploration, students will gain a strong foundation enriched with applied perspectives, and professionals will access strategies to counter real-world security challenges.
- Explores advanced cryptographic frameworks to secure complex digital ecosystems.
- Provides state-of-the-art threat intelligence methodologies to predict, detect, and neutralize risks.
- Highlights the synergy of AI and ML in building proactive, adaptive, and intelligent security solutions.
Author / Editor information
Topics
-
Download PDFPublicly Available
Frontmatter
I -
Download PDFPublicly Available
Contents
V -
Requires Authentication UnlicensedLicensed
Chapter 1 Emerging Cyber Threats: Challenges, Impacts, and Proactive Defenses in the Digital Age
1 -
Requires Authentication UnlicensedLicensed
Chapter 2 Silent Guardians: Proactive Approaches to Modern Cyber Threats
31 -
Requires Authentication UnlicensedLicensed
Chapter 3 Data Science for Threat Detection and Analysis
59 -
Requires Authentication UnlicensedLicensed
Chapter 4 An Integrated Approach: Merging Cybersecurity, AI, and Threat Detection
87 -
Requires Authentication UnlicensedLicensed
Chapter 5 Cybersecurity Analytics: A Review of Challenges and the Role of Machine Learning and Deep Learning in Threat Detection
103 -
Requires Authentication UnlicensedLicensed
Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing
141 -
Requires Authentication UnlicensedLicensed
Chapter 7 Securing the IoT Networks Using a Deep Learning Paradigm for Intrusion Detection
161 -
Requires Authentication UnlicensedLicensed
Chapter 8 Hybrid Malware Detection and Classification Using Explainable Deep Neural Network
177 -
Requires Authentication UnlicensedLicensed
Chapter 9 Light POW for Smart Grid Communication
201 -
Requires Authentication UnlicensedLicensed
Chapter 10 Zero Trust Architecture – A Beginner’s Guide
227 -
Requires Authentication UnlicensedLicensed
Chapter 11 Post-quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience Against Quantum Attacks
265 -
Requires Authentication UnlicensedLicensed
Chapter 12 Two-Factor Authentication (2FA) and Multi-factor Authentication (MFA) Solutions for Secure Mobile Data Communication
287 -
Requires Authentication UnlicensedLicensed
Chapter 13 Artificial Intelligence and Machine Learning in Cybersecurity
313 -
Requires Authentication UnlicensedLicensed
Chapter 14 Enhancing IoT Security with Zero Trust Networking: Protecting Wireless Sensors, Edge Devices, and Cloud Environments
343 -
Requires Authentication UnlicensedLicensed
Chapter 15 Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning
365 -
Requires Authentication UnlicensedLicensed
Chapter 16 Robust Dynamic Voice-Based Key Generation Using Novel Fuzzy Extraction, Averaged Thresholding, and Hamming Enhancement Techniques
385 -
Requires Authentication UnlicensedLicensed
Chapter 17 Enhancing Cybersecurity with Artificial Intelligence and Machine Learning Techniques
413 -
Requires Authentication UnlicensedLicensed
Chapter 18 Firewall and IDS in Cybersecurity
439 -
Requires Authentication UnlicensedLicensed
Index
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com