Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness
Author: Jason Sachowski
Publsiher: CRC Press
Total Pages: 480
Release: 2019-05-29
ISBN 10: 0429805837
ISBN 13: 9780429805837
Language: EN, FR, DE, ES & NL

Implementing Digital Forensic Readiness Book Review:

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness
Author: Jason Sachowski
Publsiher: CRC Press
Total Pages: 480
Release: 2019-06-07
ISBN 10: 0429805829
ISBN 13: 9780429805820
Language: EN, FR, DE, ES & NL

Implementing Digital Forensic Readiness Book Review:

Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition presents the optimal way for digital forensic and IT security professionals to implement a proactive approach to digital forensics. The book details how digital forensic processes can align strategically with business operations and an already existing information and data security program. Detailing proper collection, preservation, storage, and presentation of digital evidence, the procedures outlined illustrate how digital evidence can be an essential tool in mitigating risk and redusing the impact of both internal and external, digital incidents, disputes, and crimes. By utilizing a digital forensic readiness approach and stances, a company’s preparedness and ability to take action quickly and respond as needed. In addition, this approach enhances the ability to gather evidence, as well as the relevance, reliability, and credibility of any such evidence. New chapters to this edition include Chapter 4 on Code of Ethics and Standards, Chapter 5 on Digital Forensics as a Business, and Chapter 10 on Establishing Legal Admissibility. This book offers best practices to professionals on enhancing their digital forensic program, or how to start and develop one the right way for effective forensic readiness in any corporate or enterprise setting.

Implementing Digital Forensic Readiness

Implementing Digital Forensic Readiness
Author: Jason Sachowski
Publsiher: Syngress Publishing
Total Pages: 240
Release: 2016-03-25
ISBN 10: 9780128044544
ISBN 13: 0128044543
Language: EN, FR, DE, ES & NL

Implementing Digital Forensic Readiness Book Review:

Implementing Digital Forensics Readiness: From Reactive to Proactive Process shows information security professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics in their organization. The book begins by showing how digital forensics aligns strategically within an information security's overall program. It shows how the proper collection, preservation, and presentation of digital evidence is essential for reducing potential business impact as a result of digital crimes, disputes, and incidents, also explaining how every stage in the digital evidence lifecycle impacts the integrity of data, and how to properly manage digital evidence throughout the entire investigation. Using a digital forensic readiness approach and preparedness as a business goal, the book consists of administrative, technical, and physical actions to enhance the use digital evidence. Implementing Digital Forensics Readiness: From Reactive to Proactive Process shows how to document the available systems and logs as potential digital evidence sources. The book shows how gap analysis can be used where digital evidence is not sufficient, and the importance of monitoring data sources in a timely manner so that digital evidence can identify and detect incidents and events as they occur. Implementing Digital Forensics Readiness: From Reactive to Proactive Process offers a set of standard operating procedures to document how an evidence-based presentation of digital evidence should be made, and concludes with how to consult legal resources for reviewing digital evidence. Explores the training needed to ensure competent performance of the handling, collecting, and preservation of digital evidence Discusses the importance of how long term data storage must take into consideration confidentiality, integrity, and availability of digital evidence Emphasizes how incidents identified through proactive monitoring can be reviewed in terms of business risk Includes learning aids such as chapter introductions, objectives, summaries, and definitions

Digital Forensics and Investigations

Digital Forensics and Investigations
Author: Jason Sachowski
Publsiher: CRC Press
Total Pages: 348
Release: 2018-05-16
ISBN 10: 1351762214
ISBN 13: 9781351762212
Language: EN, FR, DE, ES & NL

Digital Forensics and Investigations Book Review:

Digital forensics has been a discipline of Information Security for decades now. Its principles, methodologies, and techniques have remained consistent despite the evolution of technology, and, ultimately, it and can be applied to any form of digital data. However, within a corporate environment, digital forensic professionals are particularly challenged. They must maintain the legal admissibility and forensic viability of digital evidence in support of a broad range of different business functions that include incident response, electronic discovery (ediscovery), and ensuring the controls and accountability of such information across networks. Digital Forensics and Investigations: People, Process, and Technologies to Defend the Enterprise provides the methodologies and strategies necessary for these key business functions to seamlessly integrate digital forensic capabilities to guarantee the admissibility and integrity of digital evidence. In many books, the focus on digital evidence is primarily in the technical, software, and investigative elements, of which there are numerous publications. What tends to get overlooked are the people and process elements within the organization. Taking a step back, the book outlines the importance of integrating and accounting for the people, process, and technology components of digital forensics. In essence, to establish a holistic paradigm—and best-practice procedure and policy approach—to defending the enterprise. This book serves as a roadmap for professionals to successfully integrate an organization’s people, process, and technology with other key business functions in an enterprise’s digital forensic capabilities.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime
Author: Frank Breitinger,Ibrahim Baggili
Publsiher: Springer
Total Pages: 235
Release: 2018-12-29
ISBN 10: 303005487X
ISBN 13: 9783030054878
Language: EN, FR, DE, ES & NL

Digital Forensics and Cyber Crime Book Review:

This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018. The 11 reviewed full papers and 1 short paper were selected from 33 submissions and are grouped in topical sections on carving and data hiding, android, forensic readiness, hard drives and digital forensics, artefact correlation.

Proceedings of the Sixth International Workshop on Digital Forensics and Incident Analysis WDFIA 2011

Proceedings of the Sixth International Workshop on Digital Forensics and Incident Analysis  WDFIA 2011
Author: Anonim
Publsiher: Lulu.com
Total Pages: 171
Release: 2011
ISBN 10: 1841022853
ISBN 13: 9781841022857
Language: EN, FR, DE, ES & NL

Proceedings of the Sixth International Workshop on Digital Forensics and Incident Analysis WDFIA 2011 Book Review:

Advances in Digital Forensics IX

Advances in Digital Forensics IX
Author: Gilbert Peterson,Sujeet Shenoi
Publsiher: Springer
Total Pages: 398
Release: 2013-10-09
ISBN 10: 3642411487
ISBN 13: 9783642411489
Language: EN, FR, DE, ES & NL

Advances in Digital Forensics IX Book Review:

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describe original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Digital Forensics and Forensic Investigations Breakthroughs in Research and Practice

Digital Forensics and Forensic Investigations  Breakthroughs in Research and Practice
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 562
Release: 2020-04-03
ISBN 10: 1799830268
ISBN 13: 9781799830269
Language: EN, FR, DE, ES & NL

Digital Forensics and Forensic Investigations Breakthroughs in Research and Practice Book Review:

As computer and internet technologies continue to advance at a fast pace, the rate of cybercrimes is increasing. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security, while cyberbullying, cyberstalking, child pornography, and trafficking crimes are made easier through the anonymity of the internet. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. Digital Forensics and Forensic Investigations: Breakthroughs in Research and Practice addresses current challenges and issues emerging in cyber forensics and new investigative tools and methods that can be adopted and implemented to address these issues and counter security breaches within various organizations. It also examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. Highlighting a range of topics such as cybercrime, threat detection, and forensic science, this publication is an ideal reference source for security analysts, law enforcement, lawmakers, government officials, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

The Best Damn Cybercrime and Digital Forensics Book Period

The Best Damn Cybercrime and Digital Forensics Book Period
Author: Jack Wiles,Anthony Reyes
Publsiher: Syngress
Total Pages: 736
Release: 2011-04-18
ISBN 10: 9780080556086
ISBN 13: 0080556086
Language: EN, FR, DE, ES & NL

The Best Damn Cybercrime and Digital Forensics Book Period Book Review:

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab. * Digital investigation and forensics is a growing industry * Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery * Appeals to law enforcement agencies with limited budgets

Security Privacy and Digital Forensics in the Cloud

Security  Privacy  and Digital Forensics in the Cloud
Author: Lei Chen,Hassan Takabi,Nhien-An Le-Khac
Publsiher: John Wiley & Sons
Total Pages: 368
Release: 2019-02-05
ISBN 10: 1119053374
ISBN 13: 9781119053378
Language: EN, FR, DE, ES & NL

Security Privacy and Digital Forensics in the Cloud Book Review:

In a unique and systematic way, this book discusses the security and privacy aspects of the cloud, and the relevant cloud forensics. Cloud computing is an emerging yet revolutionary technology that has been changing the way people live and work. However, with the continuous growth of cloud computing and related services, security and privacy has become a critical issue. Written by some of the top experts in the field, this book specifically discusses security and privacy of the cloud, as well as the digital forensics of cloud data, applications, and services. The first half of the book enables readers to have a comprehensive understanding and background of cloud security, which will help them through the digital investigation guidance and recommendations found in the second half of the book. Part One of Security, Privacy and Digital Forensics in the Cloud covers cloud infrastructure security; confidentiality of data; access control in cloud IaaS; cloud security and privacy management; hacking and countermeasures; risk management and disaster recovery; auditing and compliance; and security as a service (SaaS). Part Two addresses cloud forensics – model, challenges, and approaches; cyberterrorism in the cloud; digital forensic process and model in the cloud; data acquisition; digital evidence management, presentation, and court preparation; analysis of digital evidence; and forensics as a service (FaaS). Thoroughly covers both security and privacy of cloud and digital forensics Contributions by top researchers from the U.S., the European and other countries, and professionals active in the field of information and network security, digital and computer forensics, and cloud and big data Of interest to those focused upon security and implementation, and incident management Logical, well-structured, and organized to facilitate comprehension Security, Privacy and Digital Forensics in the Cloud is an ideal book for advanced undergraduate and master's-level students in information systems, information technology, computer and network forensics, as well as computer science. It can also serve as a good reference book for security professionals, digital forensics practitioners and cloud service providers.

ICCWS 2020 15th International Conference on Cyber Warfare and Security

ICCWS 2020 15th International Conference on Cyber Warfare and Security
Author: Prof. Brian K. Payne ,Prof. Hongyi Wu
Publsiher: Academic Conferences and publishing limited
Total Pages: 135
Release: 2020-03-12
ISBN 10: 1912764539
ISBN 13: 9781912764532
Language: EN, FR, DE, ES & NL

ICCWS 2020 15th International Conference on Cyber Warfare and Security Book Review:

11th International Conference on Cyber Warfare and Security

11th International Conference on Cyber Warfare and Security
Author: Dr Tanya Zlateva and Professor Virginia Greiman
Publsiher: Academic Conferences and publishing limited
Total Pages: 516
Release: 2016
ISBN 10: 1910810827
ISBN 13: 9781910810828
Language: EN, FR, DE, ES & NL

11th International Conference on Cyber Warfare and Security Book Review:

The 11thInternational Conference on Cyber Warfare and Security (ICCWS 2016) is being held at Boston University, Boston, USA on the 17-18th March 2016. The Conference Chair is Dr Tanya Zlateva and the Programme Chair is Professor Virginia Greiman, both from Boston University. ICCWS is a recognised Cyber Security event on the International research conferences calendar and provides a valuable platform for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyber Warfare and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and expanding range of Cyberwar and Cyber Security research available to them. The keynote speakers for the conference are Daryl Haegley from the Department of Defense (DoD), who will address the topic Control Systems Networks...What's in Your Building? and Neal Ziring from the National Security Agency who will be providing some insight to the issue of Is Security Achievable? A Practical Perspective. ICCWS received 125 abstract submissions this year. After the double blind, peer review process there are 43 Academic Research Papers 8 PhD papers Research papers, 7 Masters and 1 work-in-progress papers published in these Conference Proceedings. These papers represent work from around the world, including: Australia, Canada, China, Czech Republic, District of Columbia, Finland, France, Israel, Japan, Lebanon, Netherlands, Pakistan, Russian Federation, Saudi Arabia, South Africa, Turkey, United Arab Emirates, UK, USA.

Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy
Author: Cruz-Cunha, Maria Manuela,Mateus-Coelho, Nuno Ricardo
Publsiher: IGI Global
Total Pages: 753
Release: 2020-08-21
ISBN 10: 1799857298
ISBN 13: 9781799857297
Language: EN, FR, DE, ES & NL

Handbook of Research on Cyber Crime and Information Privacy Book Review:

In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.

Cyber Warfare and Terrorism Concepts Methodologies Tools and Applications

Cyber Warfare and Terrorism  Concepts  Methodologies  Tools  and Applications
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 1697
Release: 2020-03-06
ISBN 10: 1799824675
ISBN 13: 9781799824671
Language: EN, FR, DE, ES & NL

Cyber Warfare and Terrorism Concepts Methodologies Tools and Applications Book Review:

Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats. Highlighting a range of topics such as cyber threats, digital intelligence, and counterterrorism, this multi-volume book is ideally designed for law enforcement, government officials, lawmakers, security analysts, IT specialists, software developers, intelligence and security practitioners, students, educators, and researchers.

Digital Forensics

Digital Forensics
Author: André Årnes
Publsiher: John Wiley & Sons
Total Pages: 376
Release: 2017-05-18
ISBN 10: 1119262410
ISBN 13: 9781119262411
Language: EN, FR, DE, ES & NL

Digital Forensics Book Review:

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology – and new ways of exploiting information technology – is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. Encompasses all aspects of the field, including methodological, scientific, technical and legal matters Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime
Author: Pavel Gladyshev,Andrew Marrington,Ibrahim Baggili
Publsiher: Springer
Total Pages: 253
Release: 2014-12-22
ISBN 10: 3319142895
ISBN 13: 9783319142890
Language: EN, FR, DE, ES & NL

Digital Forensics and Cyber Crime Book Review:

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow, Russia. The 16 revised full papers presented together with 2 extended abstracts and 1 poster paper were carefully reviewed and selected from 38 submissions. The papers cover diverse topics in the field of digital forensics and cybercrime, ranging from regulation of social networks to file carving, as well as technical issues, information warfare, cyber terrorism, critical infrastructure protection, standards, certification, accreditation, automation and digital forensics in the cloud.

Digital Forensics and Cyber Crime

Digital Forensics and Cyber Crime
Author: Petr Matoušek,Martin Schmiedecker
Publsiher: Springer
Total Pages: 235
Release: 2018-01-04
ISBN 10: 3319736973
ISBN 13: 9783319736976
Language: EN, FR, DE, ES & NL

Digital Forensics and Cyber Crime Book Review:

This book constitutes the refereed proceedings of the 9th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2017, held in Prague, Czech Republic, in October 2017. The 18 full papers were selected from 50 submissions and are grouped in topical sections on malware and botnet, deanonymization, digital forensics tools, cybercrime investigation and digital forensics triage, digital forensics tools testing and validation, hacking

The Cloud Security Ecosystem

The Cloud Security Ecosystem
Author: Ryan Ko,Raymond Choo
Publsiher: Syngress
Total Pages: 570
Release: 2015-06-01
ISBN 10: 0128017805
ISBN 13: 9780128017807
Language: EN, FR, DE, ES & NL

The Cloud Security Ecosystem Book Review:

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security – putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key thought leaders and top researchers in the technical, legal, and business and management aspects of cloud security. The authors present the leading edge of cloud security research, covering the relationships between differing disciplines and discussing implementation and legal challenges in planning, executing, and using cloud security. Presents the most current and leading-edge research on cloud security from a multi-disciplinary standpoint, featuring a panel of top experts in the field Focuses on the technical, legal, and business management issues involved in implementing effective cloud security, including case examples Covers key technical topics, including cloud trust protocols, cryptographic deployment and key management, mobile devices and BYOD security management, auditability and accountability, emergency and incident response, as well as cloud forensics Includes coverage of management and legal issues such as cloud data governance, mitigation and liability of international cloud deployment, legal boundaries, risk management, cloud information security management plans, economics of cloud security, and standardization efforts

Informatics and Intelligent Applications

Informatics and Intelligent Applications
Author: Sanjay Misra,Jonathan Oluranti,Robertas Damaševičius,Rytis Maskeliunas
Publsiher: Springer Nature
Total Pages: 135
Release: 2022
ISBN 10: 303095630X
ISBN 13: 9783030956301
Language: EN, FR, DE, ES & NL

Informatics and Intelligent Applications Book Review:

This volume constitutes selected papers presented at the First International Conference on Informatics and Intelligent Applications, ICIIA 2021, held in Ota, Nigeria, in November 2021. The 22 full papers were thoroughly reviewed and selected from 108 submissions. The papers are organized in the following topical sections: AI applications; information security; emerging technologies in informatics. .

International Conference on Emerging Applications and Technologies for Industry 4 0 EATI 2020

International Conference on Emerging Applications and Technologies for Industry 4 0  EATI 2020
Author: Jemal H. Abawajy
Publsiher: Springer Nature
Total Pages: 296
Release: 2022
ISBN 10: 3030802167
ISBN 13: 9783030802165
Language: EN, FR, DE, ES & NL

International Conference on Emerging Applications and Technologies for Industry 4 0 EATI 2020 Book Review:

This book addresses the adoption of intelligent algorithms for resolving challenges in different aspects of the society such as sport, cyber-security, COVID-19 pandemic, advertising, driving, smart environment sensors, blockchain, cloud computing, and health. In addition, the book also covers machine learning fundamentals such as feature selection. The book presents practical simulation results and different illustrations in different chapters for easy understanding of concepts and approaches. The types of contributions in the book are as follows: original research, survey, and theoretical insight that describe advancement in the adoption of technique for resolving the broad range of challenges. Researchers, undergraduates, postgraduates, and industry experts will find the book as a valuable resource that bridges theory and practice. .