Buy Social Cyber Engineering and Advanced Security Algorithms
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer programming / software engineering > Algorithms and data structures > Social Cyber Engineering and Advanced Security Algorithms
Social Cyber Engineering and Advanced Security Algorithms

Social Cyber Engineering and Advanced Security Algorithms


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

This book takes readers on a captivating journey through the history of social engineering, tracing its evolution from the mechanical marvels of the clockwork era and the rise of automata to the modern age of artificial intelligence and the looming dawn of quantum computing. It explores how social engineering tactics have adapted alongside technological advancements, exploiting human psychology and vulnerabilities across every era.

Social Cyber Engineering and Advanced Security Algorithms delves into the intricate connections between human behavior, evolving technology, and the ever-changing landscape of cybersecurity. It examines how personal and psychological factors can be exploited in cyberattacks, providing real-world examples and case studies to illustrate these vulnerabilities. Beyond highlighting the challenges, the book offers proactive strategies and potential solutions for organizations and policymakers to navigate this complex terrain. It emphasizes the importance of algorithmic resilience in employee categorization and training and explores the transformative potential of quantum computing in bridging mental health and cybersecurity.

This book serves as a guide for computer scientists, engineers, and professionals interested in understanding the intricate relationship between human behavior, technology, and security in the digital age. It offers a unique perspective on the past, present, and future of social engineering, providing valuable insights for anyone seeking to build a more secure and resilient digital world.



Table of Contents:
Chapter 1 Personal Security in the Era of Mechanical Marvels: A Historical Perspective Chapter 2 Individual Cybersecurity in the Era of Digital Computing and the Internet Chapter 3 Individual Security in the Era of Algorithmic and Artificial Intelligence Advancements Chapter 4 Algorithmic Insights into the Nexus of Interpersonal Mental Challenges and Social Engineering Chapter 5 Quantum Breakthrough: Revolutionizing the Historical Challenge of Social Cyber Engineering Chapter 6 Influence of Multitasking on the Rise of Social Engineering Attacks Chapter 7 Influence of Surveillance on the Rise of Social Engineering Attacks Chapter 8 Influence of Cannabis and Drugs on the Rise of Social Engineering Attacks Chapter 9 Influence of Aging on the Rise of Social Engineering Attacks Chapter 10 Influence of Depression and Anxiety on the Rise of Social Engineering Attacks Chapter 11 Influence of Sleep and Sleep Disorder on the Rise of Social Engineering Attacks Chapter 12 Influence of Bipolar Disorder on the Rise of Social Engineering Attacks Chapter 13 Influence of Alzheimer’s, Dementia, and PTSD on the Rise of Social Engineering Attacks Chapter 14 Influence of Pandemic on the Rise of Social Engineering Attacks Chapter 15 Impacts of Discrimination in Cyber Social Engineering Systems Chapter 16 Mind Games in the Digital Playground: The Rising Threat of Social Engineering in Online Gaming and the Technological Challenges in Detection Chapter 17 Digital Surveillance and Trust Erosion Chapter 18 Virtual Reality and Its Impact on Social Trust Chapter 19 Augmented Reality and Its Impact on Social and Interpersonal Trust Chapter 20 Navigating the Intersection of Digital Marketing, Intelligent Advertising with Interpersonal Trust Chapter 21 Cryptocurrency Markets and Interpersonal Trust, Escalating Social Engineering Risks, and the Technological Challenges in Detection Chapter 22 A Brief Overview of the Benefits of Implementing Quantum Algorithms in Factorizing Cyber Social Engineering Threats Chapter 23 A Brief Overview of the Benefits of Implementing Quantum Applications in Factorizing Cyber Social Engineering Threats Chapter 24 Introduction to Hybrid Structures of the Quantum Probability Theory in Social Engineering Chapter 25 Introduction to the Quantum Structures of the Fuzzy Set in Cyber Social Engineering Systems Chapter 26 Introduction to Quantum Logic and Automata Theory in Cyber Social Engineering Systems Chapter 27 Introduction to Quantum Parallelism and Classical Computation in Cyber Social Engineering Systems

About the Author :

Soorena Merat is the Chief Cyber Security Officer at Silkatech Consulting Engineers Inc. With over three decades of experience in the technology industry, Dr. Merat brings unwavering commitment and a deep understanding of the ever-shifting cybersecurity landscape. His research focuses on the fascinating intersection of bioneural systems, artificial intelligence, and social cyber engineering. Dr. Merat’s work delves into the intricate dynamics of human behavior within technological environments, exploring how vulnerabilities emerge and how they can be proactively addressed. He is particularly interested in developing predictive models that identify potential weaknesses in systems and generating actionable recommendations for enhanced security controls. This research combines insights from neuroscience, cognitive psychology, and computer science to create a more holistic approach to cybersecurity. Driven by a passion for innovation and a commitment to excellence, Dr. Merat’s journey in the tech industry is marked by a continuous pursuit of knowledge. He remains at the forefront of advancements in the field, ensuring that his expertise and insights contribute to a safer and more secure digital world.

Dr. Wahab Almuhtadi has over 33 years of industry experience, concurrently over 27 years of university teaching experience. He is Professor/Coordinator of “Optical Systems and Sensors” Program, Algonquin College/Carleton University, Canada. He is Research Council Member, Digital Research Alliance of Canada. Previously, he was Senior System Engineer at Nortel, Optical Solutions R&D. With his professional background, he demonstrated outstanding leadership establishing Applied Research with $10.5M fund that fostered Algonquin College to become Polytechnic Institution. He is the founder of the $6 million cutting-edge Optophotonics Lab (Optical Communications Network) 200Gbps. He is one of the founders of Ontario’s Centre of Excellence in Next Generation Networks (CENGN) with $65 million in funding. His expertise is in photonics, optical systems and sensors, optical communications, and wireless. He has published several technical papers and books. He received several awards from IEEE, academia, and industry, e.g., 2010 IEEE Leadership Award, 2015 IEEE Canada W.R. Service Award, 2009 Laurent Isabelle Teaching Excellence, 2006 NISOD Award, and 2015 Canadian Pacific Railway Engineering Medal, Engineering Institute of Canada-EIC. He is P.Eng. and EIC Fellow. Dr. Almuhtadi is actively involved in IEEE for over 29 years serving in many executive level posts across IEEE. He is also currently the President-Elect/Director-Elect (2024–2025) of IEEE Canada/Region 7. IEEE President of IEEE Consumer Technology Society (CTSoc).


Best Sellers


Product Details
  • ISBN-13: 9781040348062
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: CRC Press
  • Language: English
  • ISBN-10: 1040348068
  • Publisher Date: 30 May 2025
  • Binding: Digital (delivered electronically)


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Social Cyber Engineering and Advanced Security Algorithms
Taylor & Francis Ltd -
Social Cyber Engineering and Advanced Security Algorithms
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Social Cyber Engineering and Advanced Security Algorithms

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!