Wiley-VCH - Computer Science
A Passion for Publishing

-
The Cybersecurity Control Playbook
Implement effective cybersecurity measures for all organizations Cybersecurity is one of the central concerns of our digital age. In an increasingly connected world, protecting sensitive data, maintaining system integrity, and ensuring privacy have never been more important. The Cybersecurity Control Playbook offers a step-by-step guide for implementing cybersecurity controls that will protect businesses and prepare them to compete in an overwhelmingly networked landscape. With balanced coverage of both foundational and advanced topics, and concrete examples throughout, this is a must-own resource for professionals looking to keep their businesses safe and secure. Readers will also find: * Clear, jargon-free language that makes it accessible to a wide range of readers * An introduction to developing, deploying, monitoring, testing, and retiring controls and control frameworks across large, medium, and small enterprises * A system for identifying, prioritizing, and managing cyber risks based on the MITRE ATT&CK framework, with additional coverage of other key cybersecurity frameworks The Cybersecurity Control Playbook is ideal for cybersecurity practitioners, IT professionals, and security managers who are responsible for implementing and managing cybersecurity strategies in their organizations. [544 Pages, Hardcover]
Read More...
-
Smart Cyber-Physical Power Systems, Volume 2
A practical roadmap to the application of artificial intelligence and machine learning to power systems In an era where digital technologies are revolutionizing every aspect of power systems, Smart Cyber-Physical Power Systems, Volume 2: Solutions from Emerging Technologies shifts focus to cutting-edge solutions for overcoming the challenges faced by cyber-physical power systems (CPSs). By leveraging emerging technologies, this volume explores how innovations like artificial intelligence, machine learning, blockchain, quantum computing, digital twins, and data analytics are reshaping the energy sector. This volume delves into the application of AI and machine learning in power system optimization, protection, and forecasting. It also highlights the transformative role of blockchain in secure energy trading and digital twins in simulating real-time power system operations. Advanced big data techniques are presented for enhancing system planning, situational awareness, and stability, while quantum computing offers groundbreaking approaches to solving complex energy problems. For professionals and researchers eager to harness cutting-edge technologies within smart power systems, Volume 2 proves indispensable. Filled with numerous illustrations, case studies, and technical insights, it offers forward-thinking solutions that foster a more efficient, secure, and resilient future for global energy systems, heralding a new era of innovation and transformation in cyber-physical power networks. Welcome to the exploration of Smart Cyber-Physical Power Systems (CPPSs), where challenges are met with innovative solutions, and the future of energy is shaped by the paradigms of AI/ML, Big Data, Blockchain, IoT, Quantum Computing, Information Theory, Edge Computing, Metaverse, DevOps, and more. [624 Pages, Hardcover]
Read More...
-
Quantum Computing Models for Cybersecurity and Wireless Communications
The book explores the latest quantum computing research focusing on problems and challenges in the areas of data transmission technology, computer algorithms, artificial intelligence-based devices, computer technology, and their solutions. Future quantum machines will exponentially boost computing power, creating new opportunities for improving cybersecurity. Both classical and quantum-based cyberattacks can be proactively identified and stopped by quantum-based cybersecurity before they harm. Complex math-based problems that support several encryption standards could be quickly solved by using quantum machine learning. This comprehensive book examines how quantum machine learning and quantum computing are reshaping cybersecurity, addressing emerging challenges. It includes in-depth illustrations of real-world scenarios and actionable strategies for integrating quantum-based solutions into existing cybersecurity frameworks. A range of topics are examined, including quantum-secure encryption techniques, quantum key distribution, and the impact of quantum computing algorithms. Additionally, it talks about machine learning models and how to use machine learning to solve problems. Through its in-depth analysis and innovative ideas, each chapter provides a compilation of research on cutting-edge quantum computer techniques, like blockchain, quantum machine learning, and cybersecurity. Audience This book serves as a ready reference for researchers and professionals working in the area of quantum computing models in communications, machine learning techniques, IoT-enabled technologies, and various application industries such as finance, healthcare, transportation and utilities. [384 Pages, Hardcover]
Read More...
-
Evolving Networking Technologies
EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: * Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies. * Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network. * Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today's vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management. [272 Pages, Hardcover]
Read More...
-
Securing the Digital Frontier
Secure your understanding of vital security and forensic strategies by purchasing Securing the Digital Frontier: Threats and Advanced Techniques in Security and Forensics, a definitive guide that empowers you to protect sensitive information and tackle cyber threats with insights from leading experts and real-world case studies. In the field of security and forensics, it's crucial to implement strong security measures to protect sensitive data and effectively respond to cyber incidents. Digital forensics is vital for analyzing cyber threats, where experts use advanced techniques to scrutinize digital artifacts, system logs, and network traffic. This approach helps reconstruct incidents, pinpoint vulnerabilities, and support legal actions, ensuring the confidentiality, integrity, and availability of crucial data in our rapidly evolving digital world. This book provides an in-depth look at security and forensics, pooling knowledge from top experts across various cybersecurity domains. It focuses on real-world applications and case studies, offering valuable insights for protecting information and responding to digital crimes. Designed for cybersecurity professionals, digital forensics investigators, legal teams, and academics, this comprehensive guide is a key resource for anyone looking to deepen their understanding of modern digital forensics and cybersecurity challenges. [416 Pages, Hardcover]
Read More...