Case Studies in Secure Computing: Achievements and Trends
Editat de Biju Issac, Nauman Israren Limba Engleză Paperback – 19 oct 2016
This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:
- Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection
- Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples
- Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks
- Investigates various malicious activities associated with cloud computing and proposes some countermeasures
- Examines current and emerging security threats in long-term evolution backhaul and core networks
- Supplies a brief introduction to application-layer denial-of-service (DoS) attacks
This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 404.84 lei 43-57 zile | |
CRC Press – 19 oct 2016 | 404.84 lei 43-57 zile | |
Hardback (1) | 1047.00 lei 43-57 zile | |
CRC Press – 29 aug 2014 | 1047.00 lei 43-57 zile |
Preț: 404.84 lei
Preț vechi: 506.05 lei
-20% Nou
Puncte Express: 607
Preț estimativ în valută:
77.48€ • 80.48$ • 64.36£
77.48€ • 80.48$ • 64.36£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781138034136
ISBN-10: 1138034134
Pagini: 500
Ilustrații: 166
Dimensiuni: 178 x 254 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 1138034134
Pagini: 500
Ilustrații: 166
Dimensiuni: 178 x 254 mm
Greutate: 0.45 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic and Professional Practice & DevelopmentCuprins
Intelligent Computing Case Studies. Secure Computing Case Studies.
Notă biografică
Dr. Biju Issac is a senior lecturer at the School of Computing, Teesside University, United Kingdom, and has more than 15 years of academic experience with higher education in India, Malaysia, and the United Kingdom. He earned a PhD in networking and mobile communications, along with MCA (master of computer applications) and BE (electronics and communications engineering).
He is a senior Institute of Electrical and Electronics Engineers (IEEE) member, a fellow of the Higher Education Academy, an Institution of Engineering and Technology (IET) member, and a chartered engineer (CEng). He is a CISCO-Certified Network Associate (CCNA) instructor, a Sun-Certified Java instructor, and a Lotus Notes professional. His broad research interests are in computer networks, wireless networks, computer or network security, mobility management in 802.11 networks, intelligent computing, data mining, spam detection, secure online voting, e-learning, and so forth. Dr. Issac has authored more than 60 peer-reviewed research publications, including conference papers, book chapters, and journal papers. He has supervised postgraduate research students to completion. He is in the technical program committee of many international conferences and on the editorial board of some journals and has reviewed many research papers.
Dr. Nauman Israr has been a senior lecturer at the School of Computing, Teesside University, United Kingdom, for many years. He earned his PhD in wireless sensor networks at the University of Bradford, United Kingdom. He teaches computer networks–related subjects at the university. His areas of research expertise are wireless sensor networks, wireless networked control systems, fly-by-wireless systems, active aircraft, and wireless embedded systems. Dr. Israr was a research fellow at Queen’s University Belfast (Active Aircraft Project). The aim of that project was to design and develop a wireless nervous system for the next-generation Airbus aircrafts, where the wireless system will be used to reduce the turbulence on the aircraft, thus reducing the fuel burned. He has published a number of conference papers, book chapters, and journal papers.
He is a senior Institute of Electrical and Electronics Engineers (IEEE) member, a fellow of the Higher Education Academy, an Institution of Engineering and Technology (IET) member, and a chartered engineer (CEng). He is a CISCO-Certified Network Associate (CCNA) instructor, a Sun-Certified Java instructor, and a Lotus Notes professional. His broad research interests are in computer networks, wireless networks, computer or network security, mobility management in 802.11 networks, intelligent computing, data mining, spam detection, secure online voting, e-learning, and so forth. Dr. Issac has authored more than 60 peer-reviewed research publications, including conference papers, book chapters, and journal papers. He has supervised postgraduate research students to completion. He is in the technical program committee of many international conferences and on the editorial board of some journals and has reviewed many research papers.
Dr. Nauman Israr has been a senior lecturer at the School of Computing, Teesside University, United Kingdom, for many years. He earned his PhD in wireless sensor networks at the University of Bradford, United Kingdom. He teaches computer networks–related subjects at the university. His areas of research expertise are wireless sensor networks, wireless networked control systems, fly-by-wireless systems, active aircraft, and wireless embedded systems. Dr. Israr was a research fellow at Queen’s University Belfast (Active Aircraft Project). The aim of that project was to design and develop a wireless nervous system for the next-generation Airbus aircrafts, where the wireless system will be used to reduce the turbulence on the aircraft, thus reducing the fuel burned. He has published a number of conference papers, book chapters, and journal papers.
Descriere
This book gathers the latest research with case studies in secure computing from many researchers. It compiles the recent work and findings through case studies, where the growing security attacks and countermeasures in the mobile and networking world has been explained, along with other pertinent security issues with the technology of the application itself. It discusses the challenges faced and solutions proposed by different researchers in this area.