Emerging ICT Technologies and Cybersecurity From AI and ML to Other Futuristic Technologies /

Thakur, Kutub.

Emerging ICT Technologies and Cybersecurity From AI and ML to Other Futuristic Technologies / [electronic resource] : by Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat. - 1st ed. 2023. - XXIV, 277 p. 46 illus., 38 illus. in color. online resource.

Chapter 1 – An Overview of ICT Technology Advancement -- Chapter 2 – Artificial Intelligence Technology -- Chapter 3 – Machine Learning Technology -- Chapter 4 – Blockchain Technology -- Chapter 5 – 5th Generation Wireless Technology -- Chapter 6 – Internet of Things (IoT) -- Chapter 7 – Distributed Cloud Computing -- Chapter 8 – Quantum Computing -- Chapter 9 – Tactile Virtual Reality -- Chapter 10 – An Overview of Top Futuristic Technologies -- Chapter 11 – Impact of Advanced & Futuristic Technologies on Cybersecurity.

This book introduces some fundamentals of information and communication technology (ICT) and other current and future technologies that are relevant to the field of cybersecurity. In a digitally connected world, cybersecurity is one of the most important issues today. We have witnessed tremendous advancements over the last two decades in various fields of networking, connectivity, electronics, and the technologies that make use of those platforms and devices. Many emerging technologies are also showing promise for future use in the cybersecurity area. Hence, it is important to understand some basics of the technologies and concepts that are making their impacts today and those which may show stronger influence in the near future. The book begins with an introduction to ICT and its advancements, then talks about Artificial Intelligence (AI), Machine Learning (ML), and Blockchain Technologies. It then goes on to cover wireless technology, Internet of Things (IoT), Distributed Cloud Computing, Quantum Computing, Virtual Reality, and other futuristic technologies that would be directly related to Cyberspace and Cybersecurity. This textbook is written in a step-by-step manner, with easily accessible information for both general readers and experts in the field. It is suitable to be used as a textbook for undergraduate and graduate courses like Computer Networks and Security, Information Security, etc.

9783031277658

10.1007/978-3-031-27765-8 doi


Artificial intelligence.
Machine learning.
Data protection.
Computer crimes.
Artificial Intelligence.
Machine Learning.
Data and Information Security.
Cybercrime.

Q334-342 TA347.A78

006.3
© 2024 IIIT-Delhi, library@iiitd.ac.in