Security Analytics
A Data Centric Approach to Information Security
Herausgeber: Khurana, Mehak; Mahajan, Shilpa
Security Analytics
A Data Centric Approach to Information Security
Herausgeber: Khurana, Mehak; Mahajan, Shilpa
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.
Andere Kunden interessierten sich auch für
- Philippe PeretInformation System Audit68,99 €
- Cyber-Physical Systems and Industry 4.0113,99 €
- Gregory KipperWireless Crime and Forensic Investigation85,99 €
- Michael ErbschloeWalling Out the Insiders111,99 €
- Human Rights Law and Regulating Freedom of Expression in New Media63,99 €
- Simon Hale-RossDigital Privacy, Terrorism and Law Enforcement65,99 €
- Financial Crimes74,99 €
-
-
-
This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 224
- Erscheinungstermin: 7. Oktober 2024
- Englisch
- Abmessung: 254mm x 178mm x 13mm
- Gewicht: 417g
- ISBN-13: 9781032265261
- ISBN-10: 1032265264
- Artikelnr.: 71625601
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 224
- Erscheinungstermin: 7. Oktober 2024
- Englisch
- Abmessung: 254mm x 178mm x 13mm
- Gewicht: 417g
- ISBN-13: 9781032265261
- ISBN-10: 1032265264
- Artikelnr.: 71625601
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Dr. Mehak Khurana is a Certified Ethical Hacker (CEH) and has more than 11 years of experience in teaching and research. She is currently working as an Assistant Professor at The NorthCap University, Gurugram. Prior to that, she has worked at HMRITM, GGSIPU. She earned a Ph.D. degree in the field of Information Security and Cryptography. She completed her M. Tech degree with a silver medal in Information Technology from USICT, GGSIPU, Delhi. To better align the department with the industry's best practices, she introduced and designed courses on Penetration Testing, Secure Coding and Software Vulnerabilities, Web and Mobile Security. She also organized International Conference on Cyber Security and Digital Forensics in 2021 in collaboration with Springer as a Convener. Her specialization is cybersecurity, information security, and cryptography. She has published many papers in various reputed National/International Journals and conferences. She has been a mentor to various B. Tech and M. Tech projects. She has been a resource person in various FDPs, workshops, guest lectures, and chaired the session at various Conferences. She is editing books from the various publishers like Springer, CRC Press, etc. She is serving as a reviewer for many reputed Journals and TPC member for various International Conferences. She has also been involved in activities to improve the standard of the profession. For that, she has coordinated many events in collaboration with IIT Bombay, IIT Madras, and IIIT Delhi. She successfully organized TEDx 2017 and 2019 as a co-curator. She is leading a few chapters and societies in her current university, Institute of Engineers India (IEI) CSE chapter, Programmers Club, Alumni Sub-committee, and Open Web Application Software Project at the North Cap University, and many more. She is an active member of various global societies, such as the Open Web Application Software Project (OWASP), Optical Society of America (OSA), Women in Appsec (WIA), Cryptology Research Society of India (CRSI). Dr. Shilpa Mahajan has more than 14 years of teaching experience at postgraduate and undergraduate levels. She is a committed researcher in the field of sensor networks and has done her Ph.D. in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She completed her post-graduation with distinction from Punjab Engineering College, Chandigarh. She specializes in Cyber Security, Computer Networks, Data Structures, Operating Systems, and Mobile Computing. She has introduced and designed various courses like Network Security and Cyber Security. Presently two doctoral scholars are pursuing their Ph.D. under his supervision. She has guided various M. Tech and B. Tech Projects. She has published many research papers in peer-reviewed reputed international journals and conferences. She has been a resource person in various FDPs, workshops, guest lectures, and seminars. She is a CCNA certified instructor and has also done certifications in Data Scientist Tools, Exploratory Data Analysis, and Getting and Cleaning Data from Johns Hopkins University. She is a Lifetime member of ISTE. She is a CISCO-certified training instructor for CCNA modules 1, 2, 3, and 4. She has been appointed Advanced Level Instructor this year. She received an appreciation from Cisco Networking Academy for 5 years' active participation. She also set up a CISCO Networking Academy and developed a CISCO lab at NCU, Gurgaon in January 2014.
1. A reliable blockchain application for Music in a decentralized Network.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
1. A reliable blockchain application for Music in a decentralized Network.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.