000 | 05320cam a2200493Ii 4500 | ||
---|---|---|---|
001 | 1309090369 | ||
003 | OCoLC | ||
005 | 20240304100229.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 220406s2022 nju ob 001 0 eng d | ||
020 | _a1119812542 | ||
020 | _z9781119812494 (hardback) | ||
024 | 7 |
_a10.1002/9781119812555 _2doi |
|
035 |
_a(OCoLC)1309090369 _z(OCoLC)1305913913 _z(OCoLC)1306024444 _z(OCoLC)1306055311 |
||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dEBLCP _dYDX _dN$T |
||
082 | 0 | 4 |
_a005.8 _223 |
245 | 0 | 0 |
_aCyber security and network security / _cedited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha |
264 | 1 |
_aHoboken, NJ : _bWiley ; _aBeverly, MA : _bScrivener Publishing, _c©2022. |
|
300 |
_axiv, 281 pages : _c23 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
340 |
_gpolychrome _2rdacc _0http://rdaregistry.info/termList/RDAColourContent/1003 |
||
490 | 1 | _aAdvances in Cyber Security. | |
504 | _aIncludes bibliographical references and index | ||
505 | 0 | _aFront Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest | |
520 | _aDigital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library. | ||
650 | 0 |
_aComputer networks _xSecurity measures. _0http://id.loc.gov/authorities/subjects/sh94001277 |
|
650 | 0 |
_aComputer security. _0http://id.loc.gov/authorities/subjects/sh90001862 |
|
650 | 2 |
_aComputer Security. _0https://id.nlm.nih.gov/mesh/D016494 |
|
700 | 1 |
_aGuha, Abhijit, _d1956- _0http://id.loc.gov/authorities/names/n2007218142 _eeditor |
|
700 | 1 |
_aPramanik, Sabyasachi, _d1978- _0http://id.loc.gov/authorities/names/n2020064922 _eeditor |
|
700 | 1 |
_aSamanta, Debabrata, _d1987- _0http://id.loc.gov/authorities/names/n2021015606 _eeditor |
|
700 | 1 |
_aVinay, M., _eeditor |
|
710 | 2 |
_aOhio Library and Information Network. _0http://id.loc.gov/authorities/names/no95058981 |
|
776 | 0 | 8 |
_iPrint version: _aPramanik, Sabyasachi _tCyber Security and Network Security _dNewark : John Wiley & Sons, Incorporated,c2022 _z9781119812494 |
830 | 0 | _aAdvances in Cyber Security | |
856 | 4 | 0 |
_3OhioLINK _zConnect to resource _uhttps://rave.ohiolink.edu/ebooks/ebc2/9781119812555 |
856 | 4 | 0 |
_3Wiley Online Library _zConnect to resource _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555 |
856 | 4 | 0 |
_3Wiley Online Library _zConnect to resource (off-campus) _uhttp://proxy.ohiolink.edu:9099/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119812555 |
856 | 4 | 0 |
_3Safari Books Online _zConnect to resource _uhttps://learning.oreilly.com/library/view/~/9781119812494/?ar |
942 |
_2ddc _cBK _n0 |
||
999 |
_c484834 _d484834 |