Computer and cyber security: principles, algorithm, applications, and perspectives 9780815371335, 0815371330

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text cover

2,145 310 26MB

English Pages 666 [695] Year 2019

Report DMCA / Copyright

DOWNLOAD FILE

Computer and cyber security: principles, algorithm, applications, and perspectives
 9780815371335, 0815371330

Table of contents :
Content: Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior / Alberto Huertas Celdran, Manuel Gil Perez, Felix J. Garcia Clemente, Gregorio Martinez Perez --
Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port / Andrea Chiappetta --
Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk / Baidyanath Biswas, Sukanya Patra --
Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse / Sushma Devi, Mohd Aarif Rather --
A Systematic Review of Attack Graph Generation and Analysis Techniques / Urvashi Garg, Geeta Sikka, Lalit K. Awasthi --
Biometric-Based Authentication in Cloud Computing / Poonam Saini, Awadhesh Kumar Singh --
Analysis of Various Trust Computation Methods: A Step toward Secure FANETs / Kuldeep Singh, Anil Kumar Verma, Palviaggarwal --
Security in Wireless LAN (WLAN) and WiMAX Systems / Shashank Gupta, Brij B. Gupta --
Botnet Behavior and Detection Techniques: A Review / Ammar Almomani, Osama M. Dorgham, Mohammad Alauthman, Mohammed Al-Refai, Nauman Aslam --
Overview of Smartphone Security: Attack and Defense Techniques / Diksha Goel, Ankit Kumar Jain --
Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues / Mustapha Hedabou --
Medical Image Enhancement Techniques: A Survey / Sonali Maharajan, Satya Prakash Ghrera, Amit Kumar Singh, Sima Sahu --
Extraction of Malware IOCs and TTPs Mapping with CoAs / Shiza Hasan, Masoom Alam, Tanveer Khan, Nadeem Javaid, Abid Khan --
Implementing a Secure Web-Based Application Using Microsoft SDL / Swapnoneel Roy, Pavan S. Mudundi --
Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption / Lifang Zhang, Zheng Yan, Raimo Kantola --
DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms / Brij B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta --
Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks / Parmeet Kaur, Awadhesh Kumar Singh --
Applications of Digital Signatures in Cryptography / Sarvesh Tanwar, Anil Kumar Verma --
Credit Scoring Using Birds Swarm Optimization / Damodar Reddy Edla. Pedunayak G., Tejaswini K., Hareesh K., Ramalingaswamy Cheruku --
A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes / Sankhanil Dey, Ranjan Ghosh --
Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures / Megha Quamara, Brij B. Gupta --
Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective / Somya Ranjan Sahoo, Brij B. Gupta --
23 A Compendium of Security Issues in Wireless Sensor Networks / Jasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana --
Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime / Anupama Mishra, Brij B. Gupta, Deepak Gupta

Polecaj historie