Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives, 1st Edition (Hardback) book cover

Computer and Cyber Security

Principles, Algorithm, Applications, and Perspectives, 1st Edition

Edited by Brij B. Gupta

Auerbach Publications

666 pages

Purchasing Options:$ = USD
Hardback: 9780815371335
pub: 2018-11-26
SAVE ~$23.99
$119.95
$95.96
x
eBook (VitalSource) : 9780429424878
pub: 2018-11-19
from $28.98


FREE Standard Shipping!

Description

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

Table of Contents

1 Context-Aware Systems: Protecting Sensitive Information and Controlling

Network Behavior

ALBERTO HUERTAS CELDRÁN, MANUEL GIL PÉREZ,

FÉLIX J. GARCÍA CLEMENTE, AND GREGORIO MARTÍNEZ PÉREZ

2 Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port

ANDREA CHIAPPETTA

3 Forecasting Problems in Cybersecurity: Applying Econometric Techniques to

Measure IT Risk

BAIDYANATH BISWAS AND SUKANYA PATRA

4 Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in

Contemporary Security Discourse

SUSHMA DEVI AND MOHD AARIF RATHER

5 A Systematic Review of Attack Graph Generation and Analysis Techniques

URVASHI GARG, GEETA SIKKA, AND LALIT K. AWASTHI

6 Biometric-Based Authentication in Cloud Computing

POONAM SAINI AND AWADHESH KUMAR SINGH

7 Analysis of Various Trust Computation Methods: A Step toward Secure FANETsKULDEEP SINGH, PALVI AGGARWAL, AND ANIL KUMAR VERMA

8 Security in Wireless LAN (WLAN) and WiMAX Systems

SHASHANK GUPTA AND BRIJ B. GUPTA

9 Botnet Behavior and Detection Techniques: A Review

AMMAR ALMOMANI, MOHAMMAD ALAUTHMAN, NAUMAN ASLAM, OSAMA

DORGHAM, AND MOHAMMED AL-REFAI

10 Overview of Smartphone Security: Attack and Defense Techniques

DIKSHA GOEL AND ANKIT KUMAR JAIN

11 Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues

MUSTAPHA HEDABOU

12 Medical Image Enhancement Techniques: A Survey

SONALI MAHARAJAN, SATYA PRAKASH GHRERA, AMIT KUMAR SINGH, AND

SIMA SAHU

13 Extraction of Malware IOCs and TTPs Mapping with CoAs

SHIZA HASAN, MASOOM ALAM, TANVEER KHAN, NADEEM JAVAID, AND ABID

KHAN

14 Implementing a Secure Web-Based Application Using Microsoft SDL

SWAPNONEEL ROY AND PAVAN S. MUDUNDI

15 Preserving Privacy for Trust-Based Unwanted Traffic Control with

Homomorphic Encryption

LIFANG ZHANG, ZHENG YAN, AND RAIMO KANTOLA

16 DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web

Applications on Mobile-Based Cloud Platforms

BRIJ B. GUPTA, HIMANSHU SONI, PANKAJ SIWAN, ANKIT KUMAR, AND

SHASHANK GUPTA

17 Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks

PARMEET KAUR AND AWADHESH KUMAR SINGH

18 Applications of Digital Signatures in Cryptography

SARVESH TANWAR AND ANIL KUMAR

19 Credit Scoring Using Birds Swarm Optimization

DAMODAR REDDY EDLA, PEDUNAYAK G, TEJASWINI K, HAREESH K, AND

RAMALINGASWAMY CHERUKU

20 A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and

Analysis of Crypto Secure S-Boxes

SANKHANIL DEY AND RANJAN GHOSH

21 Role of Software-Defined Networking (SDN) in Internet of Things (IoT)

Security: Attacks and Countermeasures

MEGHA QUAMARA AND BRIJ B. GUPTA

22 Security Issues and Challenges in Online Social Networks (OSNs) Based on

User Perspective

SOMYA RANJAN SAHOO AND BRIJ B. GUPTA

23 A Compendium of Security Issues in Wireless Sensor Networks

JASMINDER KAUR SANDHU, ANIL KUMAR VERMA, AND PRASHANT SINGH RANA

24 Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime

ANUPAMA MISHRA, BRIJ B. GUPTA, AND DEEPAK GUPTA

About the Editor

Editor

B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.

About the Series

Security, Privacy, and Trust in Mobile Communications

Learn more…

Subject Categories

BISAC Subject Codes/Headings:
BUS087000
BUSINESS & ECONOMICS / Production & Operations Management
COM032000
COMPUTERS / Information Technology
COM046000
COMPUTERS / Operating Systems / General
COM053000
COMPUTERS / Security / General