Advancing Computational Intelligence Techniques for Security Systems Design 1st Edition 2022 Hardbound at Meripustak

Advancing Computational Intelligence Techniques for Security Systems Design 1st Edition 2022 Hardbound

Books from same Author: Sharma, Uzzal

Books from same Publisher: Taylor and Francis Ltd

Related Category: Author List / Publisher List


  • Retail Price: ₹ 13068/- [ 11.00% off ]

    Seller Price: ₹ 11631

Sold By: Book Upload      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 11.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 11.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Sharma, Uzzal
    PublisherTaylor and Francis Ltd
    Edition1st Edition
    ISBN9781032135274
    Pages182
    BindingHardbound
    LanguageEnglish
    Publish YearAugust 2022

    Description

    Taylor and Francis Ltd Advancing Computational Intelligence Techniques for Security Systems Design 1st Edition 2022 Hardbound by Sharma, Uzzal

    * Focuses on the computational intelligence techniques of security system design_x000D__x000D_* Covers applications and algorithms of discussed computational intelligence techniques_x000D__x000D_* Includes convergence-based and enterprise integrated security systems with their applications_x000D__x000D_* Explains emerging laws, policies, and tools affecting the landscape of cyber security_x000D__x000D_* Discusses application of sensors towards the design of security systems_x000D_ _x000D_ 1. Analysis of Various Security Defence Frameworks in Different Application Areas of Cyber-Physical System. 2. Role and Development of Security Architecture and Models in Software Systems. 3. Role of IoT in the Design of a Security System. 4. IoT-Tangle Enhanced Security Systems. 5. Recent Trends in 5G and Machine Learning, Challenges and Opportunities. 6. Hardware Trojans in Microfluidic Biochips: Principles and Practice. 7. Benefits & Risks of Cloud Computing. 8. Intrusion Detection Systems for Trending Cyber-Attacks. 9. War of Control Hijacking: Attacks and Defenses. 10. IOT Based Lightweight Cryptographic Schemes._x000D_