IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cryptography, Biometrics, and Anonymity in Cybersecurity Management

Cryptography, Biometrics, and Anonymity in Cybersecurity Management
Author(s)/Editor(s): Mohammed Amin Almaiah (Department of Computer Science, The University of Jordan, Jordan)and Said Salloum (School of Science, Engineering, and Environment, University of Salford, UK)
Copyright: ©2025
DOI: 10.4018/979-8-3693-8014-7
ISBN13: 9798369380147
EISBN13: 9798369380161

Purchase

View Cryptography, Biometrics, and Anonymity in Cybersecurity Management on the publisher's website for pricing and purchasing information.


Description

An established understanding of cybersecurity and its counter parts, including cryptography and biometrics, is vital for increasing and developing security measures. As technology advances, it is imperative to stay up to date on the topic in order to increase awareness of emerging cyber threats and malware as well as prevent more sophisticated cyber-attacks. This knowledge can then be used to develop and update malware analysis, privacy-enhancing technologies, and anonymity for defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

Cryptography, Biometrics, and Anonymity in Cybersecurity Management aims to cover all essential topics of cybersecurity and cybersecurity management, with a focus on reporting on cybersecurity security issues and cybersecurity risk management as well as the latest research results, and real-world deployment of security countermeasures. Covering topics such as defense strategies, feature engineering, and face recognition, this book is an excellent resource for developers, policymakers, cybersecurity providers, cybersecurity analysts, forensic scientists, professionals, scholars, researchers, academicians, and more.



Table of Contents

More...
Less...

Author's/Editor's Biography

Mohammed Almaiah (Ed.)
Mohammed Amin Almaiah is an Associate Professor in the Department of Computer Science at The University of Jordan. He has published over 95 research papers in highly reputed journals such as the Engineering and Science Technology, an International Journal, Education and Information Technologies, IEEE Access and others. Most of his publications were indexed under the ISI Web of Science and Scopus. His current research interests include Cybersecurity and Cyber-risk assessment and mobile apps.

Said Salloum (Ed.)
Said A. Salloum received the bachelor’s degree in computer science from Yarmouk University, the M.Sc. degree in informatics (knowledge and data management) from The British University in Dubai, and the Ph.D. degree in computer science from the University of Salford, U.K. He is currently a Senior Enterprise Architect with the Computer Center, University of Sharjah, where he plays a pivotal role in shaping the university’s technological landscape. He is a highly qualified individual with a strong educational background and extensive professional experience in the field of computer science. In this capacity, he is responsible for overseeing the strategic design and implementation of cutting-edge technology solutions that facilitate the university’s teaching, research, and administrative functions. His role involves close collaboration with fellow IT professionals to ensure the security and efficiency of the university’s systems. In addition, he leads various projects aimed at introducing new technologies and enhancing existing ones to continually advance the institution’s technological capabilities. Beyond his role at the University of Sharjah, he has also made significant contributions to the field of research.

More...
Less...

Body Bottom