Computer and cyber security : principles, algorithm, applications, and perspectives / Brij B. Gupta, Dharma P. Agrawal, Haoxiang Wang.

By: Gupta, Brij B [editor. ]Contributor(s): Agrawal, Dharma P [editor. ] | Wang, Haoxiang [editor. ]Material type: TextTextPublisher: Boca Raton : CRC Press, c2019Description: xxvii, 666 pages : illustrations (black and white) ; 24 cmContent type: text Media type: unmediated Carrier type: volume ISBN: 9780367656911 [paperback]Subject(s): Computer security | Computer networks -- Security measures
Contents:
1 Context-aware systems: protecting sensitive information and controlling network behavior -- 2 Critical infrastructure protection: port cybersecurity, toward a hybrid port -- 3 Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk -- 4 Cyberspace and cybersecurity in the digital age: an evolving concern in contemporary security discourse -- 5 A systematic review of attack graph generation and analysis techniques -- 6 Biometric-based authentication in cloud computing -- 7 Analysis of various trust computation methods: a step toward secure FANETs -- 8 Security in wireless LAN (WLAN) and WiMAX Systems -- 9 Botnet behavior and detection techniques: a review -- 10 Overview of smartphone security: attack and defense techniques -- 11 Cryptography for addressing cloud computing security, privacy, and trust issues -- 12 Medical image enhancement techniques: a survey -- 13 Extraction of malware IOCs and TTPs mapping with CoAs -- 14 Implementing a secure web-based application using Microsoft SDL -- 15 Preserving privacy for trust-based unwanted traffic control with homomorphic encryption -- 16 DOM-guard: defeating DOM-based injection of XSS worms in HTML5 web applications on mobile-based cloud platforms -- 17 Secure and fault-tolerant computing in mobile ad hoc networks -- 18 Applications of digital signatures in cryptography -- 19 Credit scoring using birds swarm optimization -- 20 A review of cryptographic properties of 4-bit S-boxes with generation and analysis of crypto secure S-boxes -- 21 Role of software-defined networking (SDN) in internet of things (IoT) security: attacks and countermeasures -- 22 Security issues and challenges in online social networks (OSNs) based on user perspective -- 23 A compendium of security issues in wireless sensor networks -- 24 Identity theft, malware, and social engineering in dealing with cybercrime.
Summary: "This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies." --Provided by the publisher
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Call number Copy number Status Date due Barcode
Reference (MAIN) Reference (MAIN) College Library
005.8 C73 2019 (Browse shelf) c.1 Available 3UCBL000027249
Reference (MAIN) Reference (MAIN) College Library
005.8 C73 2019 (Browse shelf) c.2 Available 3UCBL000027250
Reference (MAIN) Reference (MAIN) College Library
005.8 C73 2019 (Browse shelf) c.3 Available 3UCBL000027251

Includes index.

1 Context-aware systems: protecting sensitive information and controlling network behavior -- 2 Critical infrastructure protection: port cybersecurity, toward a hybrid port -- 3 Forecasting problems in cybersecurity: applying econometric techniques to measure IT risk -- 4 Cyberspace and cybersecurity in the digital age: an evolving concern in contemporary security discourse -- 5 A systematic review of attack graph generation and analysis techniques -- 6 Biometric-based authentication in cloud computing -- 7 Analysis of various trust computation methods: a step toward secure FANETs -- 8 Security in wireless LAN (WLAN) and WiMAX Systems -- 9 Botnet behavior and detection techniques: a review -- 10 Overview of smartphone security: attack and defense techniques -- 11 Cryptography for addressing cloud computing security, privacy, and trust issues -- 12 Medical image enhancement techniques: a survey -- 13 Extraction of malware IOCs and TTPs mapping with CoAs -- 14 Implementing a secure web-based application using Microsoft SDL -- 15 Preserving privacy for trust-based unwanted traffic control with homomorphic encryption -- 16 DOM-guard: defeating DOM-based injection of XSS worms in HTML5 web applications on mobile-based cloud platforms -- 17 Secure and fault-tolerant computing in mobile ad hoc networks -- 18 Applications of digital signatures in cryptography -- 19 Credit scoring using birds swarm optimization -- 20 A review of cryptographic properties of 4-bit S-boxes with generation and analysis of crypto secure S-boxes -- 21 Role of software-defined networking (SDN) in internet of things (IoT) security: attacks and countermeasures -- 22 Security issues and challenges in online social networks (OSNs) based on user perspective -- 23 A compendium of security issues in wireless sensor networks -- 24 Identity theft, malware, and social engineering in dealing with cybercrime.

"This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies." --Provided by the publisher

Adult

Donation College of Computer Studies Computer Studies : Information Technology

Donation College of Computer Studies Computer Studies : Information Technology

Donation College of Computer Studies Computer Studies : Information Technology

text in English

There are no comments on this title.

to post a comment.

University of Cebu - Banilad | 6000, Gov. M. Cuenco Ave, Cebu City, 6000 Cebu, Philippines
Tel. 410 8822 local 7123| e-mail ucbaniladcampus.library@gmail.com

Powered by Koha