Sale!

Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives

Download Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives written by Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang in PDF format. This book is under the category Computers and bearing the isbn/isbn13 number 815371330/9780815371335. You may reffer the table below for additional details of the book.

$19.99

Specifications

book-author

Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang

publisher

Auerbach Publications

file-type

PDF

pages

694 pages

language

English

asin

B07KRP169L

isbn10

815371330

isbn13

9780815371335


Book Description

Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives (PDF) is a monumental reference for the theory and practice of computer security. Very comprehensive in scope; this textbook covers applied and theory; practical elements; and the reasons for the design of applications and security techniques. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. It covers both the management and the engineering issues of computer security. This ebook is acclaimed for its clear and lucid writing; scope; and its combination of formal and theoretical aspects with real systems; technologies; techniques; and policies.

NOTE: This product only includes the ebook Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives in PDF. No access codes included in the sale.

 

book-author

Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang

publisher

Auerbach Publications

file-type

PDF

pages

694 pages

language

English

asin

B07KRP169L

isbn10

815371330

isbn13

9780815371335

Table of contents


Table of contents :
Content: Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior / Alberto Huertas Celdran, Manuel Gil Perez, Felix J. Garcia Clemente, Gregorio Martinez Perez —
Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port / Andrea Chiappetta —
Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk / Baidyanath Biswas, Sukanya Patra —
Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse / Sushma Devi, Mohd Aarif Rather —
A Systematic Review of Attack Graph Generation and Analysis Techniques / Urvashi Garg, Geeta Sikka, Lalit K. Awasthi —
Biometric-Based Authentication in Cloud Computing / Poonam Saini, Awadhesh Kumar Singh —
Analysis of Various Trust Computation Methods: A Step toward Secure FANETs / Kuldeep Singh, Anil Kumar Verma, Palviaggarwal —
Security in Wireless LAN (WLAN) and WiMAX Systems / Shashank Gupta, Brij B. Gupta —
Botnet Behavior and Detection Techniques: A Review / Ammar Almomani, Osama M. Dorgham, Mohammad Alauthman, Mohammed Al-Refai, Nauman Aslam —
Overview of Smartphone Security: Attack and Defense Techniques / Diksha Goel, Ankit Kumar Jain —
Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues / Mustapha Hedabou —
Medical Image Enhancement Techniques: A Survey / Sonali Maharajan, Satya Prakash Ghrera, Amit Kumar Singh, Sima Sahu —
Extraction of Malware IOCs and TTPs Mapping with CoAs / Shiza Hasan, Masoom Alam, Tanveer Khan, Nadeem Javaid, Abid Khan —
Implementing a Secure Web-Based Application Using Microsoft SDL / Swapnoneel Roy, Pavan S. Mudundi —
Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption / Lifang Zhang, Zheng Yan, Raimo Kantola —
DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms / Brij B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta —
Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks / Parmeet Kaur, Awadhesh Kumar Singh —
Applications of Digital Signatures in Cryptography / Sarvesh Tanwar, Anil Kumar Verma —
Credit Scoring Using Birds Swarm Optimization / Damodar Reddy Edla. Pedunayak G., Tejaswini K., Hareesh K., Ramalingaswamy Cheruku —
A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes / Sankhanil Dey, Ranjan Ghosh —
Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures / Megha Quamara, Brij B. Gupta —
Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective / Somya Ranjan Sahoo, Brij B. Gupta —
23 A Compendium of Security Issues in Wireless Sensor Networks / Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana —
Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime / Anupama Mishra, Brij B. Gupta, Deepak Gupta

Reviews

There are no reviews yet.

Be the first to review “Computer and Cyber Security: Principles; Algorithm; Applications; and Perspectives”

Your email address will not be published. Required fields are marked *

Recent Posts

5 tips for a good business blog

Are you also looking for a good structure for your business blogs? That you finally have a serious and good structure for all your texts that are online? On your website but also on social media. In this review you will find 5 tips from Susanna Florie from her book: How do you…

Study tips from a budding engineer

“Why engineering?” is a question I get often. The answer for me is simple: I like to solve problems. Engineering is a popular field for many reasons. Perhaps this is because almost everything around us is created by engineers in one way or another, and there are always new, emerging and exciting technologies impacting…

How do I study mathematics and pass my exam?

Not sure how best to study math ? Are you perhaps someone who starts studying the day before the exam? Then you know yourself that your situation is not the most ideal. Unfortunately, there is no magic bullet to make you a maths crack or pass your exam in no time . It is important to know that mathematics always builds on…