Linked e-resources
Details
Table of Contents
Introduction
Cyber Threats and Attack Overview
Phishing
BOTNETS
Copyright Infringement
Cyber Forensics
Trust Management
Internet of Things (IoT) and Machine to Machine (M2M) Communication
Smart Grid
Cloud Computing
Smart Devices
E-Commerce
Social Networking Sites
Secure Incident Handling
Exploiting Artificial Intelligence for Cyber Security
Research Challenges and Future Scope.
Cyber Threats and Attack Overview
Phishing
BOTNETS
Copyright Infringement
Cyber Forensics
Trust Management
Internet of Things (IoT) and Machine to Machine (M2M) Communication
Smart Grid
Cloud Computing
Smart Devices
E-Commerce
Social Networking Sites
Secure Incident Handling
Exploiting Artificial Intelligence for Cyber Security
Research Challenges and Future Scope.