Cybersecurity Defensive Walls in Edge Computing (Intelligent Data-centric Systems)

個数:
  • 予約

Cybersecurity Defensive Walls in Edge Computing (Intelligent Data-centric Systems)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 450 p.
  • 言語 ENG
  • 商品コード 9780443341090

Full Description

Cybersecurity Defensive Walls in Edge Computing dives into the creation of robust cybersecurity defenses for increasingly vulnerable edge devices. This book examines the unique security challenges of edge environments, including limited resources and potentially untrusted networks, providing fundamental concepts for real-time vulnerability detection and mitigation through novel system architectures, experimental frameworks, and AI/ML techniques. Researchers and industry professionals working in cybersecurity, edge computing, cloud computing, defensive technologies, and threat intelligence will find this to be a valuable resource that illuminates critical aspects of edge-based security to advance theoretical analysis, system design, and practical implementation of defensive walls. With a focus on fast-growing edge application scenarios, this book offers valuable insights into strengthening real-time security for the proliferation of interconnected edge devices.

Contents

1. Fundamental concepts of cybersecurity and edge computing
2. Architectural Foundations for Cybersecurity in Edge Computing
3. Advanced adversarial defense mechanisms in edge computing
4. Microsegmentation for containerized microservices in edge computing
5. Extreme Gradient Boosting and Random Forest based Intrusion Detection System
6. Reidentification Risks in Distributed Differentially Private Data Leveraging Large Language Models
7. Cutting-Edge Advances in Edge Computing-assisted Optical Wireless Communications
8. Fortifying the Edge: Zero-Knowledge Proofs for Scalable Block Verification in NEAR Protocol
9. Detection of Hardcoded Login Credentials via Network Function
10. Advancing Cyber Resilience in Edge Computing with Secure Distributed Machine Learning
11. Defensive Walls Against Sophisticated ML-Orchestrated Attacks in Edge Computing
12. Biometric-Based Access Control mechanism for Edge Computing Resources and Services
13. Silent Threat: RAT Attack Strategy and Real Case Analysis in Edge Computing
14. Application of Blockchain for Secured Edge Computing System
15. Support Vector Machines for Enhancing Vulnerability Management and Encryption Protocols in Edge Computing
16. Social and ethical solutions to defeat cyber attacks in edge computing
17. Legal Framework and Regulatory Policies for Cyber-edge Computing Systems

最近チェックした商品