{"id":757,"date":"2022-04-07T05:09:09","date_gmt":"2022-04-07T05:09:09","guid":{"rendered":"http:\/\/aicybersecuritycenter.com\/?page_id=757"},"modified":"2022-12-12T13:50:24","modified_gmt":"2022-12-12T13:50:24","slug":"books","status":"publish","type":"page","link":"https:\/\/aicybersecuritycenter.com\/index.php\/books\/","title":{"rendered":"Books"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"757\" class=\"elementor elementor-757\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-261cd841 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"261cd841\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-10c76e5e\" data-id=\"10c76e5e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-741b9f03 elementor-widget elementor-widget-heading\" data-id=\"741b9f03\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Books (\u5716\u66f8)<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a5a6bd8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a5a6bd8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-d0af52e\" data-id=\"d0af52e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f166af4\" data-id=\"f166af4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c15a8a elementor-widget elementor-widget-text-editor\" data-id=\"5c15a8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.6.1 - 23-03-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<ul><li>\u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Internet of Vehicles, Springer, 2020\/01<\/li><li>\u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Technologies and Services Towards Smart City, Springer, 2018\/01<\/li><li>\u8a31\u6176\u8ce2(Robert Hsu), Intelligent Data-Centric Systems, Big Data Analytics for Sensor-Network Collected Intelligence, Elsevier, 2017\/01<\/li><li>\u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Technologies and Services for Smart Cities, usa, 2017\/01<\/li><li>\u8a31\u6176\u8ce2(Robert Hsu), Intelligent Data-Centric Systems, Big Data Analytics for Sensor-Network Collected Intelligence, Elsevier, 2017\/01<\/li><li>B. Gupta, Megha Quamara, \u201cSmart Card Security: Applications, Attacks, and Countermeasures,\u201d CRC Press Taylor &amp; Francis Group, USA, 2019. Available at Link: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.taylorfrancis.com\/books\/9780429345593\">https:\/\/www.taylorfrancis.com\/books\/9780429345593<\/a><\/span><\/li><li>B. Gupta, Pooja Chaudhary, \u201cCross-Site Scripting Attacks: Classification, Attack and Countermeasures\u201d CRC Press, Taylor &amp; Francis Group, USA, 2020. Available at Link: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.taylorfrancis.com\/books\/9780429351327\">https:\/\/www.taylorfrancis.com\/books\/9780429351327<\/a><\/span><\/li><li>B. Gupta, Megha Quamara, \u201cInternet of Thing Security: Principles, Applications, Attacks and Countermeasures\u201d CRC Press, Taylor &amp; Francis Group, USA, 2020. Available at Link: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.crcpress.com\/Internet-of-Things-Security-Principles-Applications-Attacks-and-Countermeasures\/Gupta-Quamara\/p\/book\/9780367373962\">https:\/\/www.crcpress.com\/Internet-of-Things-Security-Principles-Applications-Attacks-and-Countermeasures\/Gupta-Quamara\/p\/book\/9780367373962<\/a><\/span><\/li><li>B. Gupta, Aakanksha Tewari,\u201d Beginners\u2019 Guide to Internet of Thing Security: Attacks, Applications and Authentication Fundamentals and Security\u201d CRC Press, Taylor &amp; Francis Group, USA, 2020. Available at Link: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.taylorfrancis.com\/books\/9781003001126\">https:\/\/www.taylorfrancis.com\/books\/9781003001126<\/a><\/span><\/li><li>B. Gupta, \u201cAn Introduction to DDoS Attacks and Defense Mechanisms,&#8221; Academic Publishing, Germany, ISBN 978-3-8465-9569-5, 2011. Available at: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/books.google.co.in\/books\/about\/An_Introduction_to_Ddos_Attacks_and_Defe.html?id=bwOppwAACAAJ&amp;redir_esc=y\">https:\/\/books.google.co.in\/books\/about\/An_Introduction_to_Ddos_Attacks_and_Defe.html?id=bwOppwAACAAJ&amp;redir_esc=y<\/a><\/span><\/li><li>B. Gupta, Somya Ranjan Sahoo, \u201cOnline Social Networks Security: Principles, Algorithm, Applications, and Perspectives,\u201d CRC Press, Taylor &amp; Francis Group, USA, 2021.Available at:<span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.routledge.com\/Online-Social-Networks-Security-Principles-Algorithm-Applications-and\/Gupta-Sahoo\/p\/book\/9780367619794\">https:\/\/www.routledge.com\/Online-Social-Networks-Security-Principles-Algorithm-Applications-and\/Gupta-Sahoo\/p\/book\/9780367619794<\/a><\/span><\/li><li>B. Gupta, Mamta, \u201cSecure Searchable Encryption and Data Management,\u201d CRC Press, Taylor &amp; Francis Group, USA, 2021. Available at:<span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.routledge.com\/Secure-Searchable-Encryption-and-Data-Management\/Gupta-Mamta\/p\/book\/9780367619671\">https:\/\/www.routledge.com\/Secure-Searchable-Encryption-and-Data-Management\/Gupta-Mamta\/p\/book\/9780367619671<\/a><\/span><\/li><li>B. Gupta, Amrita Dahiya, \u201cDistributed Denial of Service (DDoS) Attacks \u2013 Classification, Attacks, Challenges and Countermeasures,\u201d CRC Press, Taylor &amp; Francis Group, USA, 2021. Available at<span style=\"color: #00ffff;\">:<a style=\"color: #00ffff;\" href=\"https:\/\/www.routledge.com\/Distributed-Denial-of-Service-DDoS-Attacks-Classification-Attacks-Challenges\/Gupta-Dahiya\/p\/book\/9780367619749\">https:\/\/www.routledge.com\/Distributed-Denial-of-Service-DDoS-Attacks-Classification-Attacks-Challenges\/Gupta-Dahiya\/p\/book\/9780367619749<\/a><\/span><\/li><li>B. Gupta, D. P. Agrawal, Shingo Yamaguchi, \u201cHandbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security,\u201d IGI Global Publisher, USA, 2016. Available at: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"http:\/\/www.igi-global.com\/book\/handbook-research-modern-cryptographic-solutions\/142132\">http:\/\/www.igi-global.com\/book\/handbook-research-modern-cryptographic-solutions\/142132<\/a><\/span><\/li><li>B. Gupta, D. P. Agrawal, Haoxiang Wang, \u201cComputer and Cyber Security: Principles, Algorithm, Applications, and Perspectives&#8221; CRC Press, Taylor &amp; Francis, 2018. Available at: <span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.crcpress.com\/Computer-and-Cyber-Security-Principles-Algorithm-Applications-and-Perspectives\/Gupta\/p\/book\/9780815371335\">https:\/\/www.crcpress.com\/Computer-and-Cyber-Security-Principles-Algorithm-Applications-and-Perspectives\/Gupta\/p\/book\/9780815371335<\/a><\/span><\/li><li>B. Gupta, Michael Sheng, \u201cMachine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices,&#8221; CRC Press, Taylor &amp; Francis, 2019 Available at:<span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.crcpress.com\/Machine-Learning-for-Computer-and-Cyber-Security-Principle-Algorithms\/Gupta-Sheng\/p\/book\/9781138587304\">https:\/\/www.crcpress.com\/Machine-Learning-for-Computer-and-Cyber-Security-Principle-Algorithms\/Gupta-Sheng\/p\/book\/9781138587304<\/a><\/span><\/li><li><span style=\"font-family: var(--list--font-family); font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--global--color-background); font-size: var(--global--font-size-base);\">B. Gupta, D. P. Agrawal, \u201cHandbook of Research on Cloud Computing and Big Data Applications in IoT,\u201d IGI Global Publisher, USA, 2019. Available at: <\/span><span style=\"font-family: var(--list--font-family); font-weight: var( --e-global-typography-text-font-weight ); background-color: var(--global--color-background); font-size: var(--global--font-size-base); color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.igi-global.com\/book\/handbook-research-cloud-computing-big\/217685\">https:\/\/www.igi-global.com\/book\/handbook-research-cloud-computing-big\/217685<\/a><\/span><\/li><li>B. Gupta, Gregorio Martinez Perez, D. P. Agrawal, Deepak Gupta, \u201cHandbook of Computer Networks and Cyber Security: Principles and Paradigms,\u201dMultimedia Systems and Applications Series, Springer, 2020. Available at Link:<span style=\"color: #00ffff;\"> <a style=\"color: #00ffff;\" href=\"http:\/\/www.springer.com\/series\/6298\">http:\/\/www.springer.com\/series\/6298<\/a><\/span><\/li><li>C. Joshi, B. B. Gupta, \u201cSecurity, Privacy, and Forensics Issues in Big Data,\u201d IGI Global Publisher, USA, 2020. Available at Link:<span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3561\">https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3561<\/a><\/span><\/li><li>B. Gupta, Srivathsan Srinivasagopalan, \u201cHandbook of Research on Intrusion Detection Systems,\u201d IGI Global Publisher, USA, 2020. Available at Link:<span style=\"color: #00ffff;\"> <a style=\"color: #00ffff;\" href=\"https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3774\">https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3774<\/a><\/span><\/li><li>B. Gupta, \u201cModern Principles, Practices, and Algorithms for Cloud Security,\u201d IGI Global Publisher, USA, 2019. Available at Link:<span style=\"color: #00ffff;\"><a style=\"color: #00ffff;\" href=\"https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3823\">https:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/3823<\/a><\/span><\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-72803090\" data-id=\"72803090\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Books (\u5716\u66f8) \u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Internet of Vehicles, Springer, 2020\/01 \u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Technologies and Services Towards Smart City, Springer, 2018\/01 \u8a31\u6176\u8ce2(Robert Hsu), Intelligent Data-Centric Systems, Big Data Analytics for Sensor-Network Collected Intelligence, Elsevier, 2017\/01 \u8a31\u6176\u8ce2(Robert Hsu), Internet of Vehicles, Technologies and Services for Smart Cities, usa, 2017\/01 \u8a31\u6176\u8ce2(Robert Hsu), Intelligent<a class=\"more-link\" href=\"https:\/\/aicybersecuritycenter.com\/index.php\/books\/\">Continue reading <span class=\"screen-reader-text\">&#8220;Books&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"_links":{"self":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/757"}],"collection":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/comments?post=757"}],"version-history":[{"count":13,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/757\/revisions"}],"predecessor-version":[{"id":1732,"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/pages\/757\/revisions\/1732"}],"wp:attachment":[{"href":"https:\/\/aicybersecuritycenter.com\/index.php\/wp-json\/wp\/v2\/media?parent=757"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}