Normal view MARC view ISBD view

Computer and cyber security : principles, algorithm, applications, and perspectives / edited by Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang.

Contributor(s): Gupta, Brij, 1982- [editor.] | Agrawal, Dharma P. (Dharma Prakash), 1945- [editor.] | Wang, Haoxiang [editor.].
Material type: materialTypeLabelBookPublisher: Boca Raton, FL : CRC Press, [2019]Description: 1 online resource (xxviii, 666 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9780429424878; 0429424876; 9780429756313; 0429756313; 9780429756306; 0429756305; 9780429756290; 0429756291.Subject(s): Computer security | BUSINESS & ECONOMICS / Production & Operations Management | COMPUTERS / Information Technology | COMPUTERS / Operating Systems / GeneralDDC classification: 005.8 Online resources: Taylor & Francis | OCLC metadata license agreement
Contents:
1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior ALBERTO HUERTAS CELDRÁN, MANUEL GIL PÉREZ, FÉLIX J. GARCÍA CLEMENTE, AND GREGORIO MARTÍNEZ PÉREZ 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port ANDREA CHIAPPETTA 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk BAIDYANATH BISWAS AND SUKANYA PATRA 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse SUSHMA DEVI AND MOHD AARIF RATHER 5 A Systematic Review of Attack Graph Generation and Analysis Techniques URVASHI GARG, GEETA SIKKA, AND LALIT K. AWASTHI 6 Biometric-Based Authentication in Cloud Computing POONAM SAINI AND AWADHESH KUMAR SINGH 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETsKULDEEP SINGH, PALVI AGGARWAL, AND ANIL KUMAR VERMA 8 Security in Wireless LAN (WLAN) and WiMAX Systems SHASHANK GUPTA AND BRIJ B. GUPTA 9 Botnet Behavior and Detection Techniques: A Review AMMAR ALMOMANI, MOHAMMAD ALAUTHMAN, NAUMAN ASLAM, OSAMA DORGHAM, AND MOHAMMED AL-REFAI 10 Overview of Smartphone Security: Attack and Defense Techniques DIKSHA GOEL AND ANKIT KUMAR JAIN 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues MUSTAPHA HEDABOU 12 Medical Image Enhancement Techniques: A Survey SONALI MAHARAJAN, SATYA PRAKASH GHRERA, AMIT KUMAR SINGH, AND SIMA SAHU 13 Extraction of Malware IOCs and TTPs Mapping with CoAs SHIZA HASAN, MASOOM ALAM, TANVEER KHAN, NADEEM JAVAID, AND ABID KHAN 14 Implementing a Secure Web-Based Application Using Microsoft SDL SWAPNONEEL ROY AND PAVAN S. MUDUNDI 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption LIFANG ZHANG, ZHENG YAN, AND RAIMO KANTOLA 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms BRIJ B. GUPTA, HIMANSHU SONI, PANKAJ SIWAN, ANKIT KUMAR, AND SHASHANK GUPTA 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks PARMEET KAUR AND AWADHESH KUMAR SINGH 18 Applications of Digital Signatures in Cryptography SARVESH TANWAR AND ANIL KUMAR 19 Credit Scoring Using Birds Swarm Optimization DAMODAR REDDY EDLA, PEDUNAYAK G, TEJASWINI K, HAREESH K, AND RAMALINGASWAMY CHERUKU 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes SANKHANIL DEY AND RANJAN GHOSH 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures MEGHA QUAMARA AND BRIJ B. GUPTA 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective SOMYA RANJAN SAHOO AND BRIJ B. GUPTA 23 A Compendium of Security Issues in Wireless Sensor Networks JASMINDER KAUR SANDHU, ANIL KUMAR VERMA, AND PRASHANT SINGH RANA 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime ANUPAMA MISHRA, BRIJ B. GUPTA, AND DEEPAK GUPTA
Summary: This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.
    average rating: 0.0 (0 votes)
No physical items for this record

1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior ALBERTO HUERTAS CELDRÁN, MANUEL GIL PÉREZ, FÉLIX J. GARCÍA CLEMENTE, AND GREGORIO MARTÍNEZ PÉREZ 2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port ANDREA CHIAPPETTA 3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk BAIDYANATH BISWAS AND SUKANYA PATRA 4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse SUSHMA DEVI AND MOHD AARIF RATHER 5 A Systematic Review of Attack Graph Generation and Analysis Techniques URVASHI GARG, GEETA SIKKA, AND LALIT K. AWASTHI 6 Biometric-Based Authentication in Cloud Computing POONAM SAINI AND AWADHESH KUMAR SINGH 7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETsKULDEEP SINGH, PALVI AGGARWAL, AND ANIL KUMAR VERMA 8 Security in Wireless LAN (WLAN) and WiMAX Systems SHASHANK GUPTA AND BRIJ B. GUPTA 9 Botnet Behavior and Detection Techniques: A Review AMMAR ALMOMANI, MOHAMMAD ALAUTHMAN, NAUMAN ASLAM, OSAMA DORGHAM, AND MOHAMMED AL-REFAI 10 Overview of Smartphone Security: Attack and Defense Techniques DIKSHA GOEL AND ANKIT KUMAR JAIN 11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues MUSTAPHA HEDABOU 12 Medical Image Enhancement Techniques: A Survey SONALI MAHARAJAN, SATYA PRAKASH GHRERA, AMIT KUMAR SINGH, AND SIMA SAHU 13 Extraction of Malware IOCs and TTPs Mapping with CoAs SHIZA HASAN, MASOOM ALAM, TANVEER KHAN, NADEEM JAVAID, AND ABID KHAN 14 Implementing a Secure Web-Based Application Using Microsoft SDL SWAPNONEEL ROY AND PAVAN S. MUDUNDI 15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption LIFANG ZHANG, ZHENG YAN, AND RAIMO KANTOLA 16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms BRIJ B. GUPTA, HIMANSHU SONI, PANKAJ SIWAN, ANKIT KUMAR, AND SHASHANK GUPTA 17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks PARMEET KAUR AND AWADHESH KUMAR SINGH 18 Applications of Digital Signatures in Cryptography SARVESH TANWAR AND ANIL KUMAR 19 Credit Scoring Using Birds Swarm Optimization DAMODAR REDDY EDLA, PEDUNAYAK G, TEJASWINI K, HAREESH K, AND RAMALINGASWAMY CHERUKU 20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes SANKHANIL DEY AND RANJAN GHOSH 21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures MEGHA QUAMARA AND BRIJ B. GUPTA 22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective SOMYA RANJAN SAHOO AND BRIJ B. GUPTA 23 A Compendium of Security Issues in Wireless Sensor Networks JASMINDER KAUR SANDHU, ANIL KUMAR VERMA, AND PRASHANT SINGH RANA 24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime ANUPAMA MISHRA, BRIJ B. GUPTA, AND DEEPAK GUPTA

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Includes index.

OCLC-licensed vendor bibliographic record.

There are no comments for this item.

Log in to your account to post a comment.