Leadership, Business and Management in STEM (2026. Approx. 150 p. 235 mm)

個数:
  • 予約

Leadership, Business and Management in STEM (2026. Approx. 150 p. 235 mm)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版
  • 言語 ENG
  • 商品コード 9783032105387

Full Description

This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection. The book addresses pressing challenges in today's digital landscape, from machine learning-based threat detection and blockchain security to IoT vulnerabilities and advanced persistent threat mitigation. Contributors explore innovative AI-driven solutions for defending against sophisticated cyberattacks, including phishing detection, SQL injection prevention, DDoS mitigation, and protocol-based attack identification.

The research spans multiple domains including SCADA systems security, industrial control systems protection, and the application of deep learning models for real-time threat detection. With a particular focus on practical implementation and performance evaluation, the book bridges theoretical concepts with real-world applications, making it invaluable for cybersecurity professionals, researchers, and organizations seeking to enhance their defensive capabilities against evolving cyber threats in an increasingly connected world. Based on a workshop at the International Conference on Leadership, Business, and Management with a STEM focus (ICLBM STEM 2024) held in San Francisco, California, USA, this work explores the powerful convergence of leadership, business, management, and the transformative capabilities of science, technology, engineering, and mathematics (STEM).

Contents

.- You're Doing Maslow's Hierarchy All Wrong: What Should Leadership Really Look Like in the Workplace?.
.- Logistic Regression-Driven Framework for Securing IoT Networks Against Protocol-Based Threats.
.- A Hybrid IDS for APT Detection using BI- LSTM Ensemble Learning.
.- Real-Time Detection of Time-based Blind SQL Injection Using Machine Learning for Critical Infrastructure.
.- Analytical Study for DDoS Detection Algorithms in Cloud Computing.
.- Evaluating AI-Driven Algorithms for Detection and Pre vention of Code Injection Attacks.
.- Blockchain-Based Security Algorithms Evaluation for SCADA/ICS Systems.
.- Comparing Machine Learning Algorithms for Detection and Prevention of Cyber-Attacks on IoT Devices: A Literature Review.
.- Comparative Study of Defense Algorithms Against  Denial of Service and Distributed Denial of Service Attacks.
.- Artificial Intelligence-Driven Solutions for Phishing Detection: A Comparative Analysis of Machine Learning Models.
.- Catalytic Role of Technological Turbulence between Entrepreneurial Orientation and Performance of SMEs with Mediating Nexus of Big Data Analytics and Artificial Intelligence.

最近チェックした商品