THE BOOK, IN ADDITION TO THE CYBER THREATS AND TECHNOLOGY, PROCESSES CYBER SECURITY FROM MANY SIDES AS A SOCIAL PHENOMENON AND HOW THE IMPLEMENTATION OF THE CYBER SECURITY STRATEGY IS CARRIED OUT.THE BOOK GIVES A PROFOUND IDEA OF THE MOST SPOKEN PHENOMENON OF THIS TIME. THE BOOK IS SUITABLE FOR A WIDE-RANGING AUDIENCE FROM GRADUATE TO PROFESSIONALS/PRACTITIONERS AND RESEARCHERS. RELEVANT DISCIPLINES FOR THE BOOK ARE TELECOMMUNICATIONS / NETWORK SECURITY, APPLIED MATHEMATICS / DATA ANALYSIS, MOBILE SYSTEMS / SECURITY, ENGINEERING / SECURITY OF CRITICAL INFRASTRUCTURE AND MILITARY SCIENCE / SECURITY.
“This wonderfully documented text explores the mechanics and methods of digital security and the steps necessary to ensure privacy. ... For the professional who is mathematically literate, the book is a must-read. The reference sections that follow each chapter rival that of any PhD thesis ever written. It is magnificent in its scholarship.” (James Van Speybroeck, Computing Reviews, October, 2015)