Amazon cover image
Image from Amazon.com

Cyber security and network security / edited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha

Contributor(s): Material type: TextTextSeries: Advances in Cyber SecurityPublisher: Hoboken, NJ : Beverly, MA : Wiley ; Scrivener Publishing, ©2022Description: xiv, 281 pages : 23 cmContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 1119812542
Subject(s): Additional physical formats: Print version:: Cyber Security and Network SecurityDDC classification:
  • 005.8 23
Online resources:
Contents:
Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest
Summary: Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode Item holds
Books Books Junaid Zaidi Library, COMSATS University Islamabad Ground Floor Books 005.8 CYB 63314 (Browse shelf(Opens below)) Available Hardback 10001000063314
Total holds: 0

Includes bibliographical references and index

Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest

Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

There are no comments on this title.

to post a comment.