Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives: Security, Privacy, and Trust in Mobile Communications
Editat de Brij B. Guptaen Limba Engleză Hardback – 26 noi 2018
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 261.03 lei 6-8 săpt. | |
CRC Press – 30 sep 2020 | 261.03 lei 6-8 săpt. | |
Hardback (1) | 846.87 lei 6-8 săpt. | |
CRC Press – 26 noi 2018 | 846.87 lei 6-8 săpt. |
Preț: 846.87 lei
Preț vechi: 1232.52 lei
-31% Nou
Puncte Express: 1270
Preț estimativ în valută:
162.10€ • 174.29$ • 135.14£
162.10€ • 174.29$ • 135.14£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780815371335
ISBN-10: 0815371330
Pagini: 694
Dimensiuni: 178 x 254 x 43 mm
Greutate: 1.43 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Security, Privacy, and Trust in Mobile Communications
ISBN-10: 0815371330
Pagini: 694
Dimensiuni: 178 x 254 x 43 mm
Greutate: 1.43 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Seria Security, Privacy, and Trust in Mobile Communications
Cuprins
1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior. 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port. 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk. 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse. 5 A Systematic Review of Attack Graph Generation and Analysis Techniques. 6 Biometric-Based Authentication in Cloud Computing. 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETs. 8 Security in Wireless LAN (WLAN) and WiMAX Systems. 9 Botnet Behavior and Detection Techniques: A Review. 10 Overview of Smartphone Security: Attack and Defense Techniques. 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues. 12 Medical Image Enhancement Techniques: A Survey. 13 Extraction of Malware IOCs and TTPs Mapping with CoAs. 14 Implementing a Secure Web-Based Application Using Microsoft SDL 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption. 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms. 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks. 18 Applications of Digital Signatures in Cryptography. 19 Credit Scoring Using Birds Swarm Optimization. 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes. 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures. 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective. 23 A Compendium of Security Issues in Wireless Sensor Networks. 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime.
Notă biografică
B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.
Descriere
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security and provides excellent examples of how disparate techniques and principles are combined in widely-used systems.