Atnaujinkite slapukų nuostatas

Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives [Kietas viršelis]

Edited by (Director, International Center for AI & CCRI)
Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Preface ix
Acknowledgements xi
Editors xiii
List of Contributors
xv
1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior
1(22)
Alberto Huertas Celdran
Manuel Gil Perez
Felix J. Garcia Clemente
Gregorio Martinez Perez
2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port
23(22)
Andrea Chiappetta
3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk
45(50)
Baidyanath Biswas
Sukanya Patra
4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse
95(20)
Sushma Devi
Mohd Aarif Rather
5 A Systematic Review of Attack Graph Generation and Analysis Techniques
115(32)
Urvashi Garg
Geeta Sikka
Lalit K. Awasthi
6 Biometric-Based Authentication in Cloud Computing
147(24)
Poonam Saini
Awadhesh Kumar Singh
7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs
171(24)
Kuldeep Singh
Anil Kumar Verma
Palviaggarwal
8 Security in Wireless LAN (WLAN) and WiMAX Systems
195(28)
Shashank Gupta
Brij B. Gupta
9 Botnet Behavior and Detection Techniques: A Review
223(26)
Ammar Almomani
Osama M. Dorgham
Mohammad Alauthman
Mohammed Al-Refai
Nauman Aslam
10 Overview of Smartphone Security: Attack and Defense Techniques
249(32)
Diksha Goel
Ankit Kumar Jain
11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues
281(24)
Mustapha Hedabou
12 Medical Image Enhancement Techniques: A Survey
305(30)
Sonali Maharajan
Satya Prakash Ghrera
Amit Kumar Singh
Sima Sahu
13 Extraction of Malware IOCs and TTPs Mapping with CoAs
335(20)
Shiza Hasan
Masoom Alam
Tanveer Khan
Nadeem Javaid
Abid Khan
14 Implementing a Secure Web-Based Application Using Microsoft SDL
355(34)
Swapnoneel Roy
Pavan S. Mudundi
15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption
389(36)
Lifang Zhang
Zheng Yan
Raimo Kantola
16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms
425(30)
Brij B. Gupta
Himanshu Soni
Pankaj Siwan
Ankit Kumar
Shashank Gupta
17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks
455(24)
Parmeet Kaur
Awadhesh Kumar Singh
18 Applications of Digital Signatures in Cryptography
479(30)
Sarvesh Tanwar
Anil Kumar Verma
19 Credit Scoring Using Birds Swarm Optimization
509(18)
Damodar Reddy Edla
Pedunayak G.
Tejaswini K.
Hareesh K.
Ramalingaswamy Cheruku
20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes
527(30)
Sankhanil Dey
Ranjan Ghosh
21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures
557(34)
Megha Quamara
Brij B. Gupta
22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective
591(16)
Somya Ranjan Sahoo
Brij B. Gupta
23 A Compendium of Security Issues in Wireless Sensor Networks
607(20)
Jasminder Kaur Sandhu
Anil Kumar Verma
Prashant Singh Rana
24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime
627(22)
Anupama Mishra
Brij B. Gupta
Deepak Gupta
Index 649
B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.