000 04223nam a22005895i 4500
001 978-981-15-9317-8
003 DE-He213
005 20220801215808.0
007 cr nn 008mamaa
008 201124s2021 si | s |||| 0|eng d
020 _a9789811593178
_9978-981-15-9317-8
024 7 _a10.1007/978-981-15-9317-8
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 4 _aThe "Essence" of Network Security: An End-to-End Panorama
_h[electronic resource] /
_cedited by Mohuya Chakraborty, Moutushi Singh, Valentina E. Balas, Indraneel Mukhopadhyay.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXXXV, 289 p. 97 illus., 74 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v163
505 0 _aIntroduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
520 _aThis edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks. .
650 0 _aTelecommunication.
_910437
650 0 _aMachine learning.
_91831
650 0 _aCooperating objects (Computer systems).
_96195
650 0 _aBig data.
_94174
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aMachine Learning.
_91831
650 2 4 _aCyber-Physical Systems.
_932475
650 2 4 _aBig Data.
_94174
700 1 _aChakraborty, Mohuya.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946498
700 1 _aSingh, Moutushi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946499
700 1 _aBalas, Valentina E.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946500
700 1 _aMukhopadhyay, Indraneel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_946501
710 2 _aSpringerLink (Online service)
_946502
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811593161
776 0 8 _iPrinted edition:
_z9789811593185
830 0 _aLecture Notes in Networks and Systems,
_x2367-3389 ;
_v163
_946503
856 4 0 _uhttps://doi.org/10.1007/978-981-15-9317-8
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c77871
_d77871