TY - BOOK AU - Gountia, Debasis. AU - Dalei, Dilip Kumar. AU - Mishra, Subhankar. TI - Information technology security : : modern trends and challenges SN - 9789819704064 U1 - 004.056 PY - 2024/// CY - Singapore PB - Springer KW - Systems and data security KW - Computer security KW - Information technology security KW - Cybersecurity KW - Digital security N1 - Zero Trust Security Architecture for Digital Privacy in Healthcare Ikshit Chaturvedi, Pranav M. Pawar, Raja Muthalagu, P. S. Tamizharasan Pages 1-23 Security Issues and Challenges in Deploying a CPS Using WSN Mohan Kumar Dehury, Bhabendu Kumar Mohanta, Sangay Chedup Pages 25-46 Firewall: A Vital Constituent of Network Security Ravi Shankar Yadav, Praveen Likhar Pages 47-67 Exploring the Landscape of Password Managers for Individual Users Through Innovative Solution Taskeen Zaidi, Suman Garai, Trishul V. Biradar Pages 69-99 Review on Wi-Fi Attacks and Detection Methods R. Harish, K. Praveen Pages 101-117 Privacy Preserving Spatio-Temporal Attribute-Based Access Control for Collaborative E-Healthcare Kasturi Routray, Padmalochan Bera Pages 119-146 Advances in Differential Privacy and Differentially Private Machine Learning Saswat Das, Subhankar Mishra Pages 147-188 Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks Akash Kumar, Sujit Sangram Sahoo, Sumit Kumar, Pravas Ranjan Bal, Jitendra Kumar Rout, Vijay Kumar Chaurasiya Pages 189-208 MRMM-Based Keystream Generators for Information Security Susil Kumar Bishoi, Vashek Matyas Pages 209-233 N2 - This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security ER -