Cyber security and network security / edited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha
Material type: TextSeries: Advances in Cyber SecurityPublisher: Hoboken, NJ : Beverly, MA : Wiley ; Scrivener Publishing, 2022Description: 1 online resourceContent type:- text
- computer
- online resource
- 1119812542
- 9781119812548
- 1119812550
- 9781119812555
- 005.8 PRA 24691 23 24691
- QA76.9.A25
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | COMSATS University Wah Campus | 005.8 PRA 24691 (Browse shelf(Opens below)) | Available | 10004000024691 |
Browsing COMSATS University Wah Campus shelves Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
005.8 PFL Security In Computing | 005.8 PFL Analyzing Computer Security A threat/vulnerability/countermeasure approach. | 005.8 PFL 23693 Security in computing | 005.8 PRA 24691 Cyber security and network security / | 005.8 RAN VoIP security | 005.8 RAN VoIP security | 005.8 RIT Cybersecurity operations handbook Communication. |
Includes bibliographical references and index
Front Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest
Available to OhioLINK libraries
There are no comments on this title.