Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.…mehr
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Mohuya Chakraborty presently holds the post of Dean (Faculty Development) and Professor of the department of Information Technology, Institute of Engineering & Management (IEM), Kolkata. She also holds the post of head of Human Resource Development Centre, IEM. She has done B.Tech and M. Tech from the Institute of Radio Physics and Electronics, Calcutta University in the year 1994 and 2000 respectively and PhD (Engg.) in the field of Mobile Computing from Jadavpur University in 2007. She has successfully completed Chartered Management Institute (CMI Level 5) certification from Dudley College, London, U.K. She is the recipient of prestigious Paresh Lal Dhar Bhowmik Award. She is the member of editorial board of several International journals. She has published 3 patents and over 80 research papers in reputed International journals and conferences. She is the volume editor of Contributed Book; "Proceedings of International Ethical Hacking Conference 2018 eHaCON 2018", in Springer series "Advances in Intelligent Systems and Computing book series (AISC volume 811)", published by Springer. She has handled many research projects funded by the DST, AICTE, CSIR and NRDC, and has published a number of papers in high-impact journals. Her research areas include network security, cognitive radio, brain computer interface, parallel computing etc. She is a member of IEEE Communication Society and IEEE Computational Intelligence Society as well as the faculty adviser of IEEE Communication Society and IEEE Computational Intelligence Student Branch Chapters of IEM, Kolkata Section. Satyajit Chakrabarti is Pro-Vice Chancellor, University of Engineering & Management, Kolkata and Jaipur Campus, India and Director of Institute of Engineering & Management, IEM. As the Director of one of the most reputed organizations in Engineering & Management in Eastern India, he launched a PGDM Programme to run AICTE approved Management courses, Toppers Academy to train students for certificate courses, and Software Development in the field of ERP solutions. Dr. Chakrabarti was Project Manager in TELUS, Vancouver, Canada from February 2006 to September 2009, where he was intensively involved in planning, execution, monitoring, communicating with stakeholders, negotiating with vendors and cross-functional teams, and motivating members. He managed a team of 50 employees and projects with a combined budget of $3 million. Valentina E. Balas is currently Full Professor in the Department of Automatics and Applied Software at the Faculty of Engineering, "Aurel Vlaicu" University of Arad, Romania. She holds a Ph.D. in Applied Electronics and Telecommunications from Polytechnic University of Timisoara. Dr. Balas is author of more than 300 research papers in refereed journals and International Conferences. Her research interests are in Intelligent Systems, Fuzzy Control, Soft Computing, Smart Sensors, Information Fusion, Modeling and Simulation. She is the Editor-in Chief to International Journal of Advanced Intelligence Paradigms (IJAIP) and to International Journal of Computational Systems Engineering (IJCSysE), member in Editorial Board member of several national and international journals and is evaluator expert for national, international projects and PhD Thesis. Dr. Balas is the director of Intelligent Systems Research Centre in Aurel Vlaicu University of Arad and Director of the Department of International Relations, Programs and Projects in the same university. She served as General Chair of the International Workshop Soft Computing and Applications (SOFA) in eight editions 2005-2018 held in Romania and Hungary. Dr. Balas participated in many international conferences as Organizer, Honorary Chair, Session Chair and member in Steering, Advisory or International Program Committees. She is a member of EUSFLAT, SIAM and a Senior Member IEEE, member in TC - Fuzzy Systems (IEEE CIS), member in TC - Emergent Technologies (IEEE CIS), member in TC - Soft Computing (IEEE SMCS). Dr. Balas was past Vice-president (Awards) of IFSA International Fuzzy Systems Association Council (2013-2015) and is a Joint Secretary of the Governing Council of Forum for Interdisciplinary Mathematics (FIM), - A Multidisciplinary Academic Body, India.
Inhaltsangabe
Review and Comparison of Face Detection Techniques.- Keyword Spotting with Neural Networks used for Image-Classification.- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras.- Biomedical Image Security using Matrix Manipulation and DNA Encryption.- A study on the issue of blockchain's energy consumption.- Study on network scanning using machine learning based methods.- Is Blockchain the Future of Supply Chain Management?.- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain.- Study on S-box Properties of Convolution Coder.- Smart Healthcare Assistance towards on-road Medical Emergency.- A Study on Various Database Models: Relational, Graph and Hybrid Databases.- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents.- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET.- A mobile user authentication technique in Global mobility network.- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol.- Ethical Hacking: Redefining Security in Information System.- Internal Organizational Security.- Securing Air Gapped Systems.- Data Security Techniques based on DNA Encryption.
Review and Comparison of Face Detection Techniques.- Keyword Spotting with Neural Networks used for Image-Classification.- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras.- Biomedical Image Security using Matrix Manipulation and DNA Encryption.- A study on the issue of blockchain's energy consumption.- Study on network scanning using machine learning based methods.- Is Blockchain the Future of Supply Chain Management?.- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain.- Study on S-box Properties of Convolution Coder.- Smart Healthcare Assistance towards on-road Medical Emergency.- A Study on Various Database Models: Relational, Graph and Hybrid Databases.- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents.- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET.- A mobile user authentication technique in Global mobility network.- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol.- Ethical Hacking: Redefining Security in Information System.- Internal Organizational Security.- Securing Air Gapped Systems.- Data Security Techniques based on DNA Encryption.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826