Cyber Security (eBook, PDF)
Proceedings of CSI 2015
Redaktion: Bokhari, M. U.; Saini, Dharmendra; Agrawal, Namrata
Alle Infos zum eBook verschenken
Cyber Security (eBook, PDF)
Proceedings of CSI 2015
Redaktion: Bokhari, M. U.; Saini, Dharmendra; Agrawal, Namrata
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book…mehr
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 14.61MB
- Resilience of Cyber-Physical Systems (eBook, PDF)105,95 €
- Critical Infrastructure Security and Resilience (eBook, PDF)113,95 €
- Samer Al-KhateebDeviance in Social Media and Social Cyber Forensics (eBook, PDF)48,95 €
- Open Source Intelligence Investigation (eBook, PDF)129,95 €
- Xiaodong LinIntroductory Computer Forensics (eBook, PDF)81,95 €
- Security and Privacy Trends in the Industrial Internet of Things (eBook, PDF)73,95 €
- Aamo IorliamCybersecurity in Nigeria (eBook, PDF)44,95 €
- -4%11
- -16%11
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Singapore
- Seitenzahl: 505
- Erscheinungstermin: 27. April 2018
- Englisch
- ISBN-13: 9789811085369
- Artikelnr.: 52935830
- Verlag: Springer Nature Singapore
- Seitenzahl: 505
- Erscheinungstermin: 27. April 2018
- Englisch
- ISBN-13: 9789811085369
- Artikelnr.: 52935830
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Advanced RSA Cryptographic Algorithm for Improving Data Security.
Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.
Changing Trend in Network Security Measures: A Review.
An Improved RED Algorithm with Input Sensitivity.
Security Attacks in Wireless Sensor Networks: A Survey.
Symmetric Key Encryption Technique: A Cellular Automata Based Approach.
A Comparative study on Lightweight Cryptography.
GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.
Data Security Model in Cloud Computing Environment.
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.
DNA Based Cryptography for Security in Wireless Sensor Networks.
Privacy Preservation Using Various Anonymity Models.
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.
An Advanced Dynamic Authentic Security Method for Cloud Computing.
Security in CryptDB Using Fine Grained Access Controls with ECDHE
ZeroVi's Framework.
Mitigating Cloud Security Threats Using Public Key Infrastructure.
Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.
Data Security and Encryption Technique for Cloud Storage.
Fine Grained Access Control and Secured Data Sharing in Cloud Computing.
Comparative Study of Security Risk in Social Networking and Awareness to Individual.
A Key Based Spiral Approach for DNA Cryptography.
Permission
Set Based Detection and Analysis of Android Malware.
Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.
Digital Security an Enigma.
ICMP Flood Attacks: A Vulnerability Analysis.
Statistical Approach Using Meta Features for Android Malware Detection System.
Composite Email Features for Spam Identification.
Role of Multiple Encryption in Biometric Devices.
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.
Prime Numbers: Foundation of Cryptography.
Steganography: A Survey.
Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad
hoc Networks.
Hardware Trojans: An Austere Menace Ahead.
Cyber Security for Supervisory Control and Data Acquisition.
k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.
Performance Analysis of Vulnerability Detection Scanners for Web Systems.
Performance Evaluation of Multicast Source Authentication Scheme.
Design and Implementation of a Secure Hierarchical Trust Model for PKI.
Encryption and Decryption Technique Using Java.
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.
Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.
A Robust Server
Side JavaScript Feature Injection
Based Design for JSP Web Applications Against XSS Vulnerabilities.
PHISH
SAFE: URL Features Based Phishing Detection System Using Machine Learning.
Semantic Security for Sharing Computing Knowledge/Information.
Paradigmatic Approach to Cloud Security: Challenges and Remedies.
The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.
Gaussian Tendencies in Data Flow in Communication Links.
Advanced RSA Cryptographic Algorithm for Improving Data Security.
Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.
Changing Trend in Network Security Measures: A Review.
An Improved RED Algorithm with Input Sensitivity.
Security Attacks in Wireless Sensor Networks: A Survey.
Symmetric Key Encryption Technique: A Cellular Automata Based Approach.
A Comparative study on Lightweight Cryptography.
GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.
Data Security Model in Cloud Computing Environment.
Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.
DNA Based Cryptography for Security in Wireless Sensor Networks.
Privacy Preservation Using Various Anonymity Models.
A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.
An Advanced Dynamic Authentic Security Method for Cloud Computing.
Security in CryptDB Using Fine Grained Access Controls with ECDHE
ZeroVi's Framework.
Mitigating Cloud Security Threats Using Public Key Infrastructure.
Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.
Data Security and Encryption Technique for Cloud Storage.
Fine Grained Access Control and Secured Data Sharing in Cloud Computing.
Comparative Study of Security Risk in Social Networking and Awareness to Individual.
A Key Based Spiral Approach for DNA Cryptography.
Permission
Set Based Detection and Analysis of Android Malware.
Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.
Digital Security an Enigma.
ICMP Flood Attacks: A Vulnerability Analysis.
Statistical Approach Using Meta Features for Android Malware Detection System.
Composite Email Features for Spam Identification.
Role of Multiple Encryption in Biometric Devices.
Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.
Prime Numbers: Foundation of Cryptography.
Steganography: A Survey.
Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad
hoc Networks.
Hardware Trojans: An Austere Menace Ahead.
Cyber Security for Supervisory Control and Data Acquisition.
k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.
Performance Analysis of Vulnerability Detection Scanners for Web Systems.
Performance Evaluation of Multicast Source Authentication Scheme.
Design and Implementation of a Secure Hierarchical Trust Model for PKI.
Encryption and Decryption Technique Using Java.
Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.
Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.
A Robust Server
Side JavaScript Feature Injection
Based Design for JSP Web Applications Against XSS Vulnerabilities.
PHISH
SAFE: URL Features Based Phishing Detection System Using Machine Learning.
Semantic Security for Sharing Computing Knowledge/Information.
Paradigmatic Approach to Cloud Security: Challenges and Remedies.
The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.
Gaussian Tendencies in Data Flow in Communication Links.