Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer security > Computer fraud and hacking > Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications
Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications

Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The rapid increase in IT infrastructure and presence in cyber space has given rise to enormous chances of security breach. Cybersecurity is one of the burning issues in today’s modern world and the lack of cybersecurity policy and cyber strategy might make the situation vulnerable. Today blockchain technology has almost covered every sector from business to data security. This book is written for all enthusiastic and cyber professionals in this new era of blockchain technology. Blockchain has already proved its versatile nature as adopted by several governments and tech giants from all over the world. Any anonymous user can trust another anonymous user in the cyber world with the authentication and validation via blockchain technology. Blockchain governance provides a more distributed diffusion of authority in which authentication sources are the individual themselves. This book offers approaches for cybersecurity and cyber defense via blockchain technology to counter cyber-attacks and ransomwares that are increasing every second. The book can be used in many ways by several cybersecurity professionals to secure online data, people, and networks as a part of cybersecurity, information security and cyber defense initiative with several countermeasures and defense strategies in the web. Each chapter of the book provide excellent tools and techniques for the burning and challenging issues in today’s modern cyber (and zero trust) world.

Table of Contents:
1. Use of Blockchain technology in Digital Forensics: Where and How? 2. Leveraging Blockchain technology for making Secure IoT Networks. 3. Blockchain technology: Aiding transformation in Healthcare & Medical Industry. 4. Blockchain technology strategy for Cyber Attack and Cyber crime. 5. Blockchain technology for Healthcare and Self-sovereign identity. 6. BCT4C4: Blockchain technology for Cybersecurity, cyber data, & cyber communication in today’s Cyber world. 7. Blockchain technology for Cyber defense, Cyber security: A systematic review. 8. webCyberBlock: Cybersecurity & cyber ethics via Blockchain technology - Need for web security, software practices, & end-user cyber education. 9. A study on Machine Learning and Blockchain based techniques for transparent VNF testing for 5G & B5G networks. 10. Blockchain technology solutions for Smart Contracts. 11. Blockchain technology applications for eGovernance & trust. 12. Blockchain based Secure digital library system. 13. SHSBchain: Blockchain technology solutions for Smart Homes & Smart Business. 14. blockDADS: Blockchain Technology for Data Analytics and Data Security - Applications and Solutions. 15. ISNDchain: Blockchain technology based secure Informations Systems and National Defense.

About the Author :
Naresh Kshetri is currently a full-time Faculty (Cybersecurity) at Golisano College of Computing and Information Sciences, Rochester Institute of Technology. He completed his PhD (Computer Science with concentration in Cybersecurity) from University of Missouri – St. Louis (UMSL), Missouri, USA, graduated with an MS (Cybersecurity) from Webster University, St. Louis, Missouri, USA, and also earned an MCA (Computer Applications) degree from University of Allahabad, Prayagraj, UP, India. With more than 11 years of experience and research interests in Cybersecurity, Blockchain Technology, he has published in various journals, conferences, and book chapters. His research is funded by the University of Missouri – St. Louis, the Lindenwood University, and the Emporia State University. Dr. Naresh has taught various Cybersecurity and CS courses at both the undergraduate and graduate levels. His teaching horizon expands from high schoollevel teaching to university-level teaching. Purnendu Shekhar Pandey has done his PhD from IIIT-A (Indian Institute of Information Technology, Allahabad) in Information Technology. He worked in various government and private institutions where he taught both PG and UG students. Presently he is working as an Associate Professor in the Department of Business Analytics, Jaipuria Institute of Management, Lucknow, UP, India. He has more than 12 years of experience and research interests in the field of IoT, Machine Learning, Business Analytics, NLP, Big Data, Cybersecurity, Sensor Networks, Network Coding, D2D-assisted Networks, etc. He has published various papers in SCI and ESCI Journals, top-notch conferences like ANTS, FRUCT, NOPE, CCNC (h-index> 25), and is a reviewer in various peer-reviewed SCI journals. He has given various talks on IoT, Machine Learning in Industrial IoT, Application of Power-Bi, Cybersecurity and Threats on Networks etc.in various national and international conferences. He has published more than 8 patents related to real world problems and their solutions using IoT, ML, and Blockchain. He has hosted various session chairs at various international conferences. Presently he is providing consultancy and even working on various projects with Edith Cowan University, Australia, San Diego University, USA, ThinkCloudly, and Cloud Analogy Pvt. Ltd. Mohiuddin Ahmed has been educating the next generation of cyber leaders and researching to disrupt the cybercrime ecosystem. His research is focused on ensuring national security and defending against ransomware attacks. Mohiuddin has edited several books and contributed articles to The Conversation. His research publications in reputed venues attracted more than 2900 citations and have been listed in the world’s top 2% of scientists for the 2020–2022 citation impact. Mohiuddin secured several external and internal grants worth more than $1.4 million and has been collaborating with academia and industry. He has been regularly invited to speak at international conferences and public organizations, and interviewed by the media for expert opinion.


Best Sellers


Product Details
  • ISBN-13: 9781040276280
  • Publisher: Taylor & Francis Ltd
  • Binding: Digital (delivered electronically)
  • Sub Title: Techniques, Solutions, and Applications
  • ISBN-10: 1040276288
  • Publisher Date: 30 Jan 2025
  • Language: English


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications
Taylor & Francis Ltd -
Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Blockchain Technology for Cyber Defense, Cybersecurity, and Countermeasures: Techniques, Solutions, and Applications

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!