Handbook of Computer Networks and Cyber Security (Record no. 174290)

MARC details
000 -LEADER
fixed length control field 06933nam a22005775i 4500
001 - CONTROL NUMBER
control field 978-3-030-22277-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423125113.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 191231s2020 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030222772
-- 978-3-030-22277-2
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-22277-2
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Handbook of Computer Networks and Cyber Security
Medium [electronic resource] :
Remainder of title Principles and Paradigms /
Statement of responsibility, etc edited by Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2020.
264 #1 -
-- Cham :
-- Springer International Publishing :
-- Imprint: Springer,
-- 2020.
300 ## - PHYSICAL DESCRIPTION
Extent XX, 959 p. 256 illus., 197 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Security Frameworks in Mobile Cloud Computing -- 2. An investigation study of Privacy Preserving in Cloud -- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study -- 4. A Novel AckIBE based Secure Cloud Data Management Framework -- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms -- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures -- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks -- 8. Preventing Security and Privacy Attacks in WBANs -- 9. Security in Underwater Wireless Sensor Networks -- 10. Security Issues in Cognitive Radio Ad Hoc Networks -- 11. Security and privacy in social networks: Data and Structural Anonymity -- 12. SOI FinFET for Computer Networks and Cyber Security Systems -- 13. Software Defined Networking: An Innovative Approach to Computer Networks -- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions -- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network -- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes -- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network -- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions -- 19. Fog Computing: Applications and Secure Data Aggregation -- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment -- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network -- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study -- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems -- 24. Investigation of Security Issues in Distributed Systems Monitoring -- 25. An analysis of Provable Security Frameworks for RFID Security -- 26. Computational Techniques for Real Time Credit Card Fraud Detection -- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective -- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction -- 29. QKD protocols security between theory and engineering implementation -- 30. Survey of Security and Privacy issues on Biometric system -- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics -- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces -- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators -- 34. Recent Trends in Document Authentication using Text Steganography -- 35. Machine Learning Based Intrusion Detection Techniques -- 36. Feature Selection using a Machine Learning to Classify a Malware -- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection -- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools -- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.
520 ## - SUMMARY, ETC.
Summary, etc This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial intelligence.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Artificial Intelligence.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gupta, Brij B.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Perez, Gregorio Martinez.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Agrawal, Dharma P.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gupta, Deepak.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030222765
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030222789
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783030222796
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-030-22277-2">https://doi.org/10.1007/978-3-030-22277-2</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in