Current Trends of IT and Cyber Security

 419.00 450.00

Author Name Er. Kailash Aseri, Mr. O. P. Gera
Book Type E-Book & Paperback
Categories Computers & Internet
ISBN
Language English
Pages 180
Published Date 01-JAN-2014
Publisher
Size 7.17 X 10.12 (B5)
Current Trends of...

Loading...

Indian rupee (₹) - INR
  • Indian rupee (₹) - INR
  • United States dollar ($) - USD
Clear

The computerization of our society has substantially enhanced our capabilities for both generating and collecting data from diverse sources. A tremendous amount of data has flooded almost every aspect of our lives. This explosive growth in stored or transient data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge. This has led to the generation of a promising and flourishing frontier in computer science called data mining, and its various applications. Data mining, also popularly referred to as knowledge discovery from data (KDD), is the automated or convenient extraction of patterns representing knowledge implicitly stored or captured in large databases, data warehouses, the Web, other massive information repositories, or data streams.

This book explores the concepts and techniques of Current Trends of IT and Cyber Security. As a multidisciplinary field, data mining draws on work from areas including statistics, machine learning, pattern recognition, database technology, information retrieval, network science, knowledge-based systems, artificial intelligence, high-performance computing, and data visualization. We focus on issues relating to the feasibility, usefulness, effectiveness, and scalability of techniques for the discovery of patterns hidden in large data sets. As a result, this book is not intended as an introduction to statistics, machine learning, database systems, or other such areas, although we do provide some background knowledge to facilitate the reader’s comprehension of their respective roles in data mining. Rather, the book is a comprehensive introduction to data mining. It is useful for computing science students, application developers, and business professionals, as well as researchers involved in any of the disciplines previously listed.

Data mining emerged during the late 1980s, made great strides during the 1990s, and continues to flourish into the new millennium. This book presents an overall picture of the field, introducing interesting data mining techniques and systems and discussing applications and research directions. An important motivation for writing this book was the need to build an organized framework for the study of data mining—a challenging task, owing to the extensive multidisciplinary nature of this fast-developing field. We hope that this book will encourage people with different backgrounds and experiences to exchange their views regarding data mining so as to contribute toward the further promotion and shaping of this exciting and dynamic field.

Our capabilities of both generating and collecting data have been increasing rapidly in the last several decades. Contributing factors include the widespread use of bar codes for most commercial products, the computerization of many business, scientific, and government transactions, and advances in data collection tools ranging from scanned text and image platforms to satellite remote sensing systems. In addition, popular use of the World Wide Web as a global information system has flooded us with a tremendous amount of data and information. This explosive growth in stored data has generated an urgent need for new techniques and automated tools that can intelligently assist us in transforming the vast amounts of data into useful information and knowledge.

This book was designed to cover a wide range of topics in the data mining field. As a result, it is an excellent handbook on the subject. Because each chapter is designed to be as standalone as possible, you can focus on the topics that most interest you. The book can be used by application programmers and information service managers who wish to learn about the key ideas of data mining on their own. The book would also be useful for technical data analysis staff in banking, insurance, medicine, and retailing industries who are interested in applying data mining solutions to their businesses. Moreover, the book may serve as a comprehensive survey of the data mining field, which may also benefit researchers who would like to advance the state-of-the-art in data mining and extend the scope of data mining applications.

Electronic Commerce, provides complete coverage of the key business and technology elements of electronic commerce. The book does not assume that readers have any previous electronic commerce knowledge or experience.

Undergraduate and graduate business school courses in electronic commerce. Although I had used a variety of books and other materials in my corporate training work, I was concerned that those materials would not work well in university courses because they were written at widely varying levels and did not have the organization and pedagogic features, such as review questions, that are so important to students. After searching for a textbook that offered balanced coverage of both the business and technology elements of electronic commerce, We concluded that no such book existed. The first edition of Electronic Commerce was written to fill that void. Since that first edition, We have worked to improve the book and keep it current with the rapid changes in this dynamic field.

This book presents a comprehensive set of practices that are designed to ensure security in cyberspace. Those practices were developed over the latter part of this decade by the U.S. federal government. Given that pedigree and the currency of its ideas, this framework provides very authoritative advice about how to create practical cybersecurity. Even so, it is hard to truly understand how to apply a complicated framework like this, by simply studying its contents. It is much better to experience the nuances of cybersecurity practice through an actual attempt to establish the process. That attempt is captured in a story about a fictional company. The story illustrates the actual problems that such a company might encounter in attempting to secure itself in the real world.

SKU: N/A
Categories:,
Author Name

Er. Kailash Aseri, Mr. O. P. Gera

Categories

Computers & Internet

ISBN

Language

English

Pages

180

Published Date

01-JAN-2014

Publisher

Size

7.17 X 10.12 (B5)

Book Format

e-Book

Author(s) Details

ER. KAILASH ASERI

He is working as Assistant Professor in Computer Science Department. He contributed in Technical Education and Training in India, Academic Institutions. He has contributed in knowledge domains of IT, Computers. He is recognized for his Excellent Academic, Technocratic and Administrative achievements in Education and Technology Management and Research. He has obtained Diploma in Electronics & Communication Engineering, Bachelor of Engineering in Computer Science, Master of Technology in Computer Science, Post Graduate Diploma in Cyber Law, Master of Philosophy in Computer Science Engineering and now pursuing Doctor of Philosophy in Computer Science Engineering. He has several global Certifications like MCP, MCPD from Microsoft USA and EC-Council Certified Secure Computer User with more than 4 years Academic/Research & Industrial experience; He is a Life Member for the ISTE, ISCA, PAS & Member of CSI, IASCIT, IAENG etc. He has presented papers in various National & International Conferences. He has Contributing as co-author of book “Programming with C & C++”.He unfolds his wings as a social activist, columnist, creative writer in technology and composer with equal ease. He has written more than 7 articles/research papers pertaining to the current issues, technology research and policies; published in various magazines, National and International Research Journals.

MR. O. P. GERA

He is Director of Nextgen Compusoft Pvt. Ltd. He has contributed in knowledge domains of IT, Computers. He is recognized for his Excellent Academic, Technocratic and Administrative achievements in Education and Technology Management and Research. He has Master of Technology in Computer Science, and Post Graduate Diploma in Business Administration and now doing Doctor of Philosophy in Computer Science. He has several global Certifications like MCP from Microsoft USA and EC-Council Certified Ethical Hacker with more than 10 years Academic/Research & Industrial experience; He is a member for the CSI, IEEE. He has Contributing as author of book “Programming with C & C++”. He unfolds his wings as a social activist, columnist, creative writer in technology and composer with equal ease. He has written more than 5 articles/research papers pertaining to the current issues, technology research and policies; published in various National and referred International Research Journals.

Customer Reviews

There are no reviews yet.

Be the first to review “Current Trends of IT and Cyber Security”

No more offers for this product!

General Inquiries

There are no inquiries yet.