Cover image for Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
Title:
Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives
Physical Description:
xxvii, 666 pages : illustrations ; 26 cm.
ISBN:
9780815371335

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010369649 QA76.9.A25 C668 2019 Open Access Book Book
Searching...
Searching...
33000000003160 QA76.9.A25 C668 2019 Open Access Book Book
Searching...

On Order

Summary

Summary

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.


Author Notes

B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.


Table of Contents

Alberto Huertas Celdrán and Manuel Gil Pérez and Félix J. García Clemente and Greorio Martínez PérezAndrea ChiappettaBaidyanath Biswas and Sukanya PatraSushma Devi and Mohd Aarif RatherUrvashi Garg and Geeta Sikka and Lalit k. AwasthiPoonam Saini and Awadhesh Kumar SinghKuldeep Singh and Anil Kumar Verma and PalviaggarwalShashank Gupta and Brij B. GuptaAmmar Almomani and Osama M. Dorgham and Mohammad Alauthman and Mohammed Al-Refai and Nauman AslamDiksha Goel and Ankit Kumar JainMustapha HedabouSonali Maharajan and Satya Prakash Ghrera and Amit Kumar Singh and Sima SahuShiza Hasan and Masoom Alam and Tanveer Khan and Nadeem Javaid and Abid KhanSwapnoneel Roy and Pavan S. MudundiLifang Zhang and Zheng Yan and Raimo KantolaBrij B. Gupta and Himanshu Soni and Pankaj Siwan and Ankit Kumar and Shashank GuptaParmeet Kaur and Awadhesh Kumar SinghSarvesh Tanwar and Anil Kumar VermaDamodar Reddy Edla and Pedunayak G and Tejaswini k and Hareesh k and Ramalingaswamy CherukuSankhanil Deya and Ranjan GhoshMegha Quamara and Brij B. GuptaSomya Ranjan Sahoo and Brij B. GuptaJasminder Kaur Sandhu and Anil Kumar Verma and Prashant Singh RanaAnupama Mishra and Brij B. Gupta and Deepak Gupta
Prefacep. ix
Acknowledgementsp. xi
Editorsp. xiii
List of Contributorsp. xv
1 Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behaviorp. 1
2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Portp. 23
3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure It Riskp. 45
4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discoursep. 95
5 A Systematic Review of Attack Graph Generation and Analysis Techniquesp. 115
6 Biometric-Based Authentication in Cloud Computingp. 147
7 Analysis of Various Trust Computation Methods: A Step toward Secure Fanetsp. 171
8 Security in Wireless Lan (Wlan) and Wimax Systemsp. 195
9 Botnet Behavior and Detection Techniques: A Reviewp. 223
10 Overview of Smartphone Security: Attack and Defense Techniquesp. 249
11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issuesp. 281
12 Medical Image Enhancement Techniques: A Surveyp. 305
13 Extraction of Malware IOCs and TTPs Mapping with CoAsp. 335
14 Implementing a Secure Web-Based Application Using Microsoft Sdlp. 355
15 Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryptionp. 389
16 Dom-Guard: Defeating Dom-Based Injection of XSS Worms in Html5p. 425
17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networksp. 455
18 Applications of Digital Signatures in Cryptographyp. 479
19 Credit Scoring Using Birds Swarm Optimizationp. 509
20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxesp. 527
21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasuresp. 557
22 Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspectivep. 591
23 A Compendium of Security Issues in Wireless Sensor Networksp. 607
24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrimep. 627
Indexp. 649