Computer Security Threats
Thomas, Ciza
Computer Security Threats - IntechOpen 2020 - 1 electronic resource (130 p.)
Open Access
This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures.
Creative Commons
English
intechopen.83233 9781838802400 9781838802394 9781839623813
10.5772/intechopen.83233 doi
Computer networking & communications
Cloud computing
Computer Security Threats - IntechOpen 2020 - 1 electronic resource (130 p.)
Open Access
This book on computer security threats explores the computer security threats and includes a broad set of solutions to defend the computer systems from these threats. The book is triggered by the understanding that digitalization and growing dependence on the Internet poses an increased risk of computer security threats in the modern world. The chapters discuss different research frontiers in computer security with algorithms and implementation details for use in the real world. Researchers and practitioners in areas such as statistics, pattern recognition, machine learning, artificial intelligence, deep learning, data mining, data analytics and visualization are contributing to the field of computer security. The intended audience of this book will mainly consist of researchers, research students, practitioners, data analysts, and business professionals who seek information on computer security threats and its defensive measures.
Creative Commons
English
intechopen.83233 9781838802400 9781838802394 9781839623813
10.5772/intechopen.83233 doi
Computer networking & communications
Cloud computing
