Experience reading like never before
Sign in to continue reading.
Discover and read thousands of books from independent authors across India
Visit the bookstore"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh PalS. R. Jena is currently working as Faculty Associate in the Department of Computer Science and Engineering at the École Centrale School of Engineering, Mahindra University, Hyderabad, India. He received his M. Tech degree in Information Technology form Utkal University, Bhubaneswar, Odisha, India in the year 2013, B. Tech in Computer Science and Engineering degree from BPUT, Rourkela, Odisha, India in the year 2010 and also certified by CCNA and Diploma in Computer Hardware and Networking Management from CTTC, Bhubaneswar, Odisha, India in the year 2011. He has more than 8 years of teaching eRead More...
S. R. Jena is currently working as Faculty Associate in the Department of Computer Science and Engineering at the École Centrale School of Engineering, Mahindra University, Hyderabad, India. He received his M. Tech degree in Information Technology form Utkal University, Bhubaneswar, Odisha, India in the year 2013, B. Tech in Computer Science and Engineering degree from BPUT, Rourkela, Odisha, India in the year 2010 and also certified by CCNA and Diploma in Computer Hardware and Networking Management from CTTC, Bhubaneswar, Odisha, India in the year 2011. He has more than 8 years of teaching experience from various reputed Universities and Colleges in India.
He is basically an Academician, an Author, a Researcher, a Trainer, a Reviewer of various International Journals and International Conferences and a Keynote Speaker. His publications have more than 300 citations, h index of 9, and i10 index of 8 (Google Scholar). He has published 19 international level books, around 27+ international level research articles in various international journals, conferences, and filed 20+ international patents. He has been awarded by Bharat Education Excellence Awards in the year 2022, Excellent Performance in Educational Domain & Outstanding Contributions in Teaching in the year 2022 and Best Researcher by Gurukul Academic Awards in 2022. His research interests include Cloud and Distributed Computing, Internet of Things, Green Computing, Sustainability, Renewable Energy Resources, Internet of Energy etc.
He can be reached by Email: soumyajena1989@gmail.com.
Read Less...Achievements
In the digital age, where information reigns supreme and threats lurk in every byte, cyber security has become the cornerstone of a safe and connected world. Yet, securing this vast digital landscape requires more than just vigilance; it demands a deep understanding of the very structures that hold our data captive. This book bridges the gap between the abstract realm of data structures and the tangible world of cyber defense. We delve into the intricate worki
In the digital age, where information reigns supreme and threats lurk in every byte, cyber security has become the cornerstone of a safe and connected world. Yet, securing this vast digital landscape requires more than just vigilance; it demands a deep understanding of the very structures that hold our data captive. This book bridges the gap between the abstract realm of data structures and the tangible world of cyber defense. We delve into the intricate workings of stacks, queues, trees, and graphs, not as mere academic exercises, but as powerful tools for building robust and resilient systems.Throughout these pages, you'll discover how data structures form the backbone of intrusion detection systems, malware analysis tools, and encryption algorithms. You'll learn to harness their efficiency to sift through oceans of data, identify malicious patterns, and thwart cyberattacks before they wreak havoc. This book is not just a technical manual; it's an invitation to think like a cyber warrior. It empowers you to see the digital world through a new lens, where every line of code and every byte of data becomes a potential weapon or shield.
So, arm yourself with knowledge, sharpen your algorithmic skills, and prepare to step into the frontlines of the digital battlefield. The future of cyberspace, and the safety of the information we cherish, depends on it.
The book Defensive Cyberspace: Navigating the Landscape of Cyber Security contains 13 chapters. They are given as follows:
1. Introduction to Cyber Security
2. Foundations of Cyber Security
3. Cyber Threat Landscape
4. Risk Management in Cyber Security
5. Network Security
6. Endpoint Security
7. Identity and Access Management
8. Incident R
The book Defensive Cyberspace: Navigating the Landscape of Cyber Security contains 13 chapters. They are given as follows:
1. Introduction to Cyber Security
2. Foundations of Cyber Security
3. Cyber Threat Landscape
4. Risk Management in Cyber Security
5. Network Security
6. Endpoint Security
7. Identity and Access Management
8. Incident Response and Forensics
9. Security Awareness and Training
10. Securing Cloud Environments
11. Emerging Technologies and Cyber Security
12. International Cyber Security Collaboration
13. The Future of Cyber Security
Are you sure you want to close this?
You might lose all unsaved changes.
The items in your Cart will be deleted, click ok to proceed.