Computer and Cyber Security
Principles, Algorithm, Applications, and Perspectives
Herausgeber: Gupta, Brij B.
Computer and Cyber Security
Principles, Algorithm, Applications, and Perspectives
Herausgeber: Gupta, Brij B.
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security and provides excellent examples of how disparate techniques and principles are combined in widely-used systems.
Andere Kunden interessierten sich auch für
Tyler Justin SpeedAsset Protection through Security Awareness86,99 €
Jessica BarkerConfident Cyber Security60,99 €
Simon GrimaDigital Transformation, Strategic Resilience Cyber Security and Risk Management150,99 €
OecdBuilding a Skilled Cyber Security Workforce in Latin America33,99 €
Savitha JCyber Security and Ethics40,99 €
Savitha JCYBER SECURITY AND ETHICS40,99 €
Constant KonanCYBER-KRIMINALITÄT IN CÔTE D'IVOIRE37,90 €-
-
-
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security and provides excellent examples of how disparate techniques and principles are combined in widely-used systems.
Produktdetails
- Produktdetails
- Verlag: Auerbach Publications
- Seitenzahl: 696
- Erscheinungstermin: 26. November 2018
- Englisch
- Abmessung: 260mm x 183mm x 42mm
- Gewicht: 1482g
- ISBN-13: 9780815371335
- ISBN-10: 0815371330
- Artikelnr.: 54710145
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Auerbach Publications
- Seitenzahl: 696
- Erscheinungstermin: 26. November 2018
- Englisch
- Abmessung: 260mm x 183mm x 42mm
- Gewicht: 1482g
- ISBN-13: 9780815371335
- ISBN-10: 0815371330
- Artikelnr.: 54710145
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.
1 Context-Aware Systems: Protecting Sensitive Information and Controlling
Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity,
Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying
Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity
in the Digital Age: An Evolving Concern in Contemporary Security Discourse.
5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6
Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various
Trust Computation Methods: A Step toward Secure FANETs. 8 Security in
Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection
Techniques: A Review. 10 Overview of Smartphone Security: Attack and
Defense Techniques. 11 Cryptography for Addressing Cloud Computing
Security, Privacy, and Trust Issues. 12 Medical Image Enhancement
Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with
CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15
Preserving Privacy for Trust-Based Unwanted Traffic Control with
Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS
Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure
and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of
Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm
Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with
Generation and Analysis of Crypto Secure S-Boxes. 21 Role of
Software-Defined Networking (SDN) in Internet of Things (IoT) Security:
Attacks and Countermeasures. 22 Security Issues and Challenges in Online
Social Networks (OSNs) Based on User Perspective. 23 A Compendium of
Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware,
and Social Engineering in Dealing with Cybercrime.
Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity,
Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying
Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity
in the Digital Age: An Evolving Concern in Contemporary Security Discourse.
5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6
Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various
Trust Computation Methods: A Step toward Secure FANETs. 8 Security in
Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection
Techniques: A Review. 10 Overview of Smartphone Security: Attack and
Defense Techniques. 11 Cryptography for Addressing Cloud Computing
Security, Privacy, and Trust Issues. 12 Medical Image Enhancement
Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with
CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15
Preserving Privacy for Trust-Based Unwanted Traffic Control with
Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS
Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure
and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of
Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm
Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with
Generation and Analysis of Crypto Secure S-Boxes. 21 Role of
Software-Defined Networking (SDN) in Internet of Things (IoT) Security:
Attacks and Countermeasures. 22 Security Issues and Challenges in Online
Social Networks (OSNs) Based on User Perspective. 23 A Compendium of
Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware,
and Social Engineering in Dealing with Cybercrime.
1 Context-Aware Systems: Protecting Sensitive Information and Controlling
Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity,
Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying
Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity
in the Digital Age: An Evolving Concern in Contemporary Security Discourse.
5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6
Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various
Trust Computation Methods: A Step toward Secure FANETs. 8 Security in
Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection
Techniques: A Review. 10 Overview of Smartphone Security: Attack and
Defense Techniques. 11 Cryptography for Addressing Cloud Computing
Security, Privacy, and Trust Issues. 12 Medical Image Enhancement
Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with
CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15
Preserving Privacy for Trust-Based Unwanted Traffic Control with
Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS
Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure
and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of
Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm
Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with
Generation and Analysis of Crypto Secure S-Boxes. 21 Role of
Software-Defined Networking (SDN) in Internet of Things (IoT) Security:
Attacks and Countermeasures. 22 Security Issues and Challenges in Online
Social Networks (OSNs) Based on User Perspective. 23 A Compendium of
Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware,
and Social Engineering in Dealing with Cybercrime.
Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity,
Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying
Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity
in the Digital Age: An Evolving Concern in Contemporary Security Discourse.
5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6
Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various
Trust Computation Methods: A Step toward Secure FANETs. 8 Security in
Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection
Techniques: A Review. 10 Overview of Smartphone Security: Attack and
Defense Techniques. 11 Cryptography for Addressing Cloud Computing
Security, Privacy, and Trust Issues. 12 Medical Image Enhancement
Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with
CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15
Preserving Privacy for Trust-Based Unwanted Traffic Control with
Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS
Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure
and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of
Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm
Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with
Generation and Analysis of Crypto Secure S-Boxes. 21 Role of
Software-Defined Networking (SDN) in Internet of Things (IoT) Security:
Attacks and Countermeasures. 22 Security Issues and Challenges in Online
Social Networks (OSNs) Based on User Perspective. 23 A Compendium of
Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware,
and Social Engineering in Dealing with Cybercrime.







