Specifications
book-author | Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang |
---|
publisher | Auerbach Publications |
---|
file-type | PDF |
---|
pages | 694 pages |
---|
language | English |
---|
asin | B07KRP169L |
---|
isbn10 | 815371330 |
---|
isbn13 | 9780815371335 |
---|
Book Description
Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives (PDF) is a monumental reference for the theory and practice of computer security. Very comprehensive in scope; this textbook covers applied and theory; practical elements; and the reasons for the design of applications and security techniques. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. It covers both the management and the engineering issues of computer security. This ebook is acclaimed for its clear and lucid writing; scope; and its combination of formal and theoretical aspects with real systems; technologies; techniques; and policies.
NOTE: This product only includes the ebook Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives in PDF. No access codes included in the sale.
Table of contents
Table of contents :
Content: Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior / Alberto Huertas Celdran, Manuel Gil Perez, Felix J. Garcia Clemente, Gregorio Martinez Perez —
Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port / Andrea Chiappetta —
Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk / Baidyanath Biswas, Sukanya Patra —
Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse / Sushma Devi, Mohd Aarif Rather —
A Systematic Review of Attack Graph Generation and Analysis Techniques / Urvashi Garg, Geeta Sikka, Lalit K. Awasthi —
Biometric-Based Authentication in Cloud Computing / Poonam Saini, Awadhesh Kumar Singh —
Analysis of Various Trust Computation Methods: A Step toward Secure FANETs / Kuldeep Singh, Anil Kumar Verma, Palviaggarwal —
Security in Wireless LAN (WLAN) and WiMAX Systems / Shashank Gupta, Brij B. Gupta —
Botnet Behavior and Detection Techniques: A Review / Ammar Almomani, Osama M. Dorgham, Mohammad Alauthman, Mohammed Al-Refai, Nauman Aslam —
Overview of Smartphone Security: Attack and Defense Techniques / Diksha Goel, Ankit Kumar Jain —
Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues / Mustapha Hedabou —
Medical Image Enhancement Techniques: A Survey / Sonali Maharajan, Satya Prakash Ghrera, Amit Kumar Singh, Sima Sahu —
Extraction of Malware IOCs and TTPs Mapping with CoAs / Shiza Hasan, Masoom Alam, Tanveer Khan, Nadeem Javaid, Abid Khan —
Implementing a Secure Web-Based Application Using Microsoft SDL / Swapnoneel Roy, Pavan S. Mudundi —
Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption / Lifang Zhang, Zheng Yan, Raimo Kantola —
DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms / Brij B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta —
Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks / Parmeet Kaur, Awadhesh Kumar Singh —
Applications of Digital Signatures in Cryptography / Sarvesh Tanwar, Anil Kumar Verma —
Credit Scoring Using Birds Swarm Optimization / Damodar Reddy Edla. Pedunayak G., Tejaswini K., Hareesh K., Ramalingaswamy Cheruku —
A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes / Sankhanil Dey, Ranjan Ghosh —
Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures / Megha Quamara, Brij B. Gupta —
Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective / Somya Ranjan Sahoo, Brij B. Gupta —
23 A Compendium of Security Issues in Wireless Sensor Networks / Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana —
Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime / Anupama Mishra, Brij B. Gupta, Deepak Gupta