Computer and Network Security Essentials
-15%
portes grátis
Computer and Network Security Essentials
Ertaul, Levent; Daimi, Kevin; Francia, Guillermo; El-Sheikh, Eman; Encinas, Luis Hernandez
Springer International Publishing AG
05/2018
618
Mole
Inglês
9783319864044
15 a 20 dias
9475
Descrição não disponível.
Part I.COMPUTER SECURITY.- Chapter 1.Computer Security.- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems.- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics.- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack.- Part II. NETWORK SECURITY.- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.- Chapter 7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems.- Chapter 8. Security protocols for networks and Internet: A global vision.- Chapter 9. Differentiating Security from Privacy in Internet of Things-A Survey of Threats and Solutions.- Chapter 10. Reliable Transmission Protocol for Underwater Acoustic Networks.- Chapter 11. Using Sports Plays to Con?gure Honeypots Environments to form a Virtual Security Shield.- PART 3: CRYPTOGRAPHIC TECHNOLOGIES.- Chapter 12.Security Threats and Solutions for Two Dimensional Barcodes: A Comparative Study.- Chapter 13. Searching Encrypted Data on the Cloud.- Chapter 14. A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services.- Chapter 15.Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.- Chapter 16.Secure elliptic curves in Cryptography.- Chapter 17.Network models for malware propagation in Wireless Sensor Networks: An Analysis.- PART 4: BIOMETRICS AND FORENSICS.- Chapter 18. Biometric Systems for User Authentication.- Chapter 19. Biometric Authentication and Data Security in Cloud Computing.- Chapter 20. Approximate Search in Digital Forensics.- Chapter 21.Privacy Preserving Internet Browsers - Forensic Analysis.- Part v. HARDWARE SECURITY.- Chapter 22. Experimental Digital Forensics of SubscriberIdentification Module (SIM) Card.- Chapter 23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security against Modeling Attacks.- Chapter 24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs.- PART 6. SECURITY APPLICATIONS.- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking.- Chapter 26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns.- Chapter 27.Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment.- PART 7: SECURITY MANAGEMENT.- Chapter 28. Securing the Internet of Things: Best Practices for Deploying IoT Devices.- Chapter 29. Cognitive Computing and Multiscale Analysis for Cyber Security.- Chapter 30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems.- Chapter 31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts.- Chapter 32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems.- Chapter 33. Accountability for Federated Clouds.- Chapter 34. A Cognitive and Concurrent Cyber Kill Chain Model.- Chapter 35.Defense Methods Against Social Engineering Attacks.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Computer Security;Network Security;Security Applications;Security Management;Cryptographic Technologies;Information Assurance;Biometric Security;Forensic Security;Hardware Security
Part I.COMPUTER SECURITY.- Chapter 1.Computer Security.- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems.- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics.- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack.- Part II. NETWORK SECURITY.- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.- Chapter 7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems.- Chapter 8. Security protocols for networks and Internet: A global vision.- Chapter 9. Differentiating Security from Privacy in Internet of Things-A Survey of Threats and Solutions.- Chapter 10. Reliable Transmission Protocol for Underwater Acoustic Networks.- Chapter 11. Using Sports Plays to Con?gure Honeypots Environments to form a Virtual Security Shield.- PART 3: CRYPTOGRAPHIC TECHNOLOGIES.- Chapter 12.Security Threats and Solutions for Two Dimensional Barcodes: A Comparative Study.- Chapter 13. Searching Encrypted Data on the Cloud.- Chapter 14. A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services.- Chapter 15.Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers.- Chapter 16.Secure elliptic curves in Cryptography.- Chapter 17.Network models for malware propagation in Wireless Sensor Networks: An Analysis.- PART 4: BIOMETRICS AND FORENSICS.- Chapter 18. Biometric Systems for User Authentication.- Chapter 19. Biometric Authentication and Data Security in Cloud Computing.- Chapter 20. Approximate Search in Digital Forensics.- Chapter 21.Privacy Preserving Internet Browsers - Forensic Analysis.- Part v. HARDWARE SECURITY.- Chapter 22. Experimental Digital Forensics of SubscriberIdentification Module (SIM) Card.- Chapter 23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security against Modeling Attacks.- Chapter 24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs.- PART 6. SECURITY APPLICATIONS.- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking.- Chapter 26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns.- Chapter 27.Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment.- PART 7: SECURITY MANAGEMENT.- Chapter 28. Securing the Internet of Things: Best Practices for Deploying IoT Devices.- Chapter 29. Cognitive Computing and Multiscale Analysis for Cyber Security.- Chapter 30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems.- Chapter 31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts.- Chapter 32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems.- Chapter 33. Accountability for Federated Clouds.- Chapter 34. A Cognitive and Concurrent Cyber Kill Chain Model.- Chapter 35.Defense Methods Against Social Engineering Attacks.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.