Browse Subject Headings
Optimization Techniques for Decision-Making and Information Security
Optimization Techniques for Decision-Making and Information Security
Click to enlarge
ISBN No.: 9789815196337
Pages: 150
Year: 202405
Format: Trade Cloth (Hard Cover)
Price: $ 53.82
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Optimization Techniques for Decision-making and Information Security is a scholarly compilation that has been edited by experts with specialized knowledge in the fields of decision theory and cybersecurity. Through the synthesis of an extensive array of information, this edited volume presents novel methodologies and approaches that forge a link between the critical domain of information security and the realm of decision-making processes.The publication commences with a fundamental investigation that establishes the theoretical foundations of information security-relevant decision-making models. The subsequent chapters present comprehensive evaluations of real-world applications, showcasing an assortment of optimization techniques. The book offers a wide range of perspectives on the practical implementation of data analysis in various domains, including but not limited to power generation and optimization, solid transportation problems, soft computing techniques, wireless sensor networks, parametric set-valued optimization problems, data aggregation optimization techniques, fuzzy linear programming problems, and nonlinear chaotic systems. The anthology concludes with a comprehensive summary of the most noteworthy observations and ramifications extracted from the projects of all contributors.Key features- Presents a wide variety of sophisticated optimization methodologies- Explores the intricate intersection of decision theory and the safeguarding of confidential information.- Emphasizes effectiveness in improving decision-making processes designed to strengthen information security measures.


- Showcases practical examples in different industrial domains through case studies and real-world problems.- Provides guidance and contemplations on strengthening information security environments.- Includes scientific references for advanced reading This book serves as an essential reference for policymakers, researchers, and professionals who are learning about or working in information security roles. ReadershipPolicymakers, researchers, and professionals in information security roles.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...
Browse Subject Headings