Cyber-Vigilance and Digital Trust (eBook, ePUB)
Cyber Security in the Era of Cloud Computing and IoT
Redaktion: Tounsi, Wiem
Alle Infos zum eBook verschenken
Cyber-Vigilance and Digital Trust (eBook, ePUB)
Cyber Security in the Era of Cloud Computing and IoT
Redaktion: Tounsi, Wiem
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today's landscape, organizations need to acquire and develop effective security tools and mechanisms - not only to keep up with cyber criminals, but also to stay one step ahead. Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis,…mehr
- Geräte: eReader
- mit Kopierschutz
- eBook Hilfe
- Größe: 1.83MB
- Cyber Security and Digital Forensics (eBook, ePUB)190,99 €
- Abbas KudratiZero Trust Journey Across the Digital Estate (eBook, ePUB)47,95 €
- Blockchain for Distributed Systems Security (eBook, ePUB)107,99 €
- Zoubir Z. MammeriCryptography (eBook, ePUB)117,99 €
- Abderrazak MkadmiArchives in the Digital Age (eBook, ePUB)139,99 €
- Phil QuadeThe Digital Big Bang (eBook, ePUB)19,99 €
- Mike BursellTrust in Computer Systems and the Cloud (eBook, ePUB)32,99 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: John Wiley & Sons
- Seitenzahl: 256
- Erscheinungstermin: 29. April 2019
- Englisch
- ISBN-13: 9781119618386
- Artikelnr.: 56524075
- Verlag: John Wiley & Sons
- Seitenzahl: 256
- Erscheinungstermin: 29. April 2019
- Englisch
- ISBN-13: 9781119618386
- Artikelnr.: 56524075
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Code 164 4.6.1. Formal Specification of the Under-Tainting Problem 164 4.6.2. Formal Under-Tainting Solution 166 4.6.3. System Design 175 4.6.4. Handling Explicit and Control Flows In Java Android Apps
Code 176 4.6.5. Handling Explicit and Control Flows In Native Android Apps
Code 180 4.6.6. Evaluation 184 4.6.7. Discussion 187 4.7. Protection Against Code Obfuscation Attacks Based on Control Dependencies In Android Systems 188 4.7.1. Code Obfuscation Definition 188 4.7.2. Types of Program Obfuscations 189 4.7.3. Obfuscation Techniques 189 4.7.4. Code Obfuscation In Android System 190 4.7.5. Attack Model 191 4.7.6. Code Obfuscation Attacks 192 4.7.7. Detection of Code Obfuscation Attacks 194 4.7.8. Obfuscation Code Attack Tests 195 4.8. Detection of Side Channel Attacks Based on Data Tainting In Android Systems 198 4.8.1. Target Threat Model 199 4.8.2. Side Channel Attacks 200 4.8.3. Propagation Rules for Detecting Side Channel Attacks 203 4.8.4. Implementation 205 4.8.5. Evaluation 207 4.9. Tracking Information Flow In Android Systems Approaches Comparison: Summary 210 4.10. Conclusion and Highlights 215 4.11. References 216 List of Authors 227 Index 229
Code 164 4.6.1. Formal Specification of the Under-Tainting Problem 164 4.6.2. Formal Under-Tainting Solution 166 4.6.3. System Design 175 4.6.4. Handling Explicit and Control Flows In Java Android Apps
Code 176 4.6.5. Handling Explicit and Control Flows In Native Android Apps
Code 180 4.6.6. Evaluation 184 4.6.7. Discussion 187 4.7. Protection Against Code Obfuscation Attacks Based on Control Dependencies In Android Systems 188 4.7.1. Code Obfuscation Definition 188 4.7.2. Types of Program Obfuscations 189 4.7.3. Obfuscation Techniques 189 4.7.4. Code Obfuscation In Android System 190 4.7.5. Attack Model 191 4.7.6. Code Obfuscation Attacks 192 4.7.7. Detection of Code Obfuscation Attacks 194 4.7.8. Obfuscation Code Attack Tests 195 4.8. Detection of Side Channel Attacks Based on Data Tainting In Android Systems 198 4.8.1. Target Threat Model 199 4.8.2. Side Channel Attacks 200 4.8.3. Propagation Rules for Detecting Side Channel Attacks 203 4.8.4. Implementation 205 4.8.5. Evaluation 207 4.9. Tracking Information Flow In Android Systems Approaches Comparison: Summary 210 4.10. Conclusion and Highlights 215 4.11. References 216 List of Authors 227 Index 229