Security Analytics (eBook, PDF)
A Data Centric Approach to Information Security
Redaktion: Khurana, Mehak; Mahajan, Shilpa
47,95 €
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
47,95 €
Als Download kaufen
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
24 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
47,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
24 °P sammeln
Security Analytics (eBook, PDF)
A Data Centric Approach to Information Security
Redaktion: Khurana, Mehak; Mahajan, Shilpa
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.6MB
Andere Kunden interessierten sich auch für
- Unleashing the Art of Digital Forensics (eBook, PDF)57,95 €
- Bishwajeet PandeyIntroduction to the Cyber Ranges (eBook, PDF)47,95 €
- Cyber Security Threats and Challenges Facing Human Life (eBook, PDF)52,95 €
- Cyber Security Applications for Industry 4.0 (eBook, PDF)57,95 €
- Wendy F. GoucherSecurity Awareness Design in the New Normal Age (eBook, PDF)47,95 €
- Security and Resilience of Cyber Physical Systems (eBook, PDF)55,95 €
- Shekhar KhandelwalPhishing Detection Using Content-Based Image Classification (eBook, PDF)20,95 €
-
-
-
This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 236
- Erscheinungstermin: 24. Juni 2022
- Englisch
- ISBN-13: 9781000597547
- Artikelnr.: 63949504
- Verlag: Taylor & Francis
- Seitenzahl: 236
- Erscheinungstermin: 24. Juni 2022
- Englisch
- ISBN-13: 9781000597547
- Artikelnr.: 63949504
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Mehak Khurana is a Certified Ethical Hacker (CEH) and has more than 11 years of experience in teaching and research. She is currently working as an Assistant Professor at The NorthCap University, Gurugram. Prior to that, she has worked at HMRITM, GGSIPU. She earned a Ph.D. degree in the field of Information Security and Cryptography. She completed her M. Tech degree with a silver medal in Information Technology from USICT, GGSIPU, Delhi. To better align the department with the industry's best practices, she introduced and designed courses on Penetration Testing, Secure Coding and Software Vulnerabilities, Web and Mobile Security. She also organized International Conference on Cyber Security and Digital Forensics in 2021 in collaboration with Springer as a Convener. Her specialization is cybersecurity, information security, and cryptography. She has published many papers in various reputed National/International Journals and conferences. She has been a mentor to various B. Tech and M. Tech projects. She has been a resource person in various FDPs, workshops, guest lectures, and chaired the session at various Conferences. She is editing books from the various publishers like Springer, CRC Press, etc. She is serving as a reviewer for many reputed Journals and TPC member for various International Conferences. She has also been involved in activities to improve the standard of the profession. For that, she has coordinated many events in collaboration with IIT Bombay, IIT Madras, and IIIT Delhi. She successfully organized TEDx 2017 and 2019 as a co-curator. She is leading a few chapters and societies in her current university, Institute of Engineers India (IEI) CSE chapter, Programmers Club, Alumni Sub-committee, and Open Web Application Software Project at the North Cap University, and many more. She is an active member of various global societies, such as the Open Web Application Software Project (OWASP), Optical Society of America (OSA), Women in Appsec (WIA), Cryptology Research Society of India (CRSI). Dr. Shilpa Mahajan has more than 14 years of teaching experience at postgraduate and undergraduate levels. She is a committed researcher in the field of sensor networks and has done her Ph.D. in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She completed her post-graduation with distinction from Punjab Engineering College, Chandigarh. She specializes in Cyber Security, Computer Networks, Data Structures, Operating Systems, and Mobile Computing. She has introduced and designed various courses like Network Security and Cyber Security. Presently two doctoral scholars are pursuing their Ph.D. under his supervision. She has guided various M. Tech and B. Tech Projects. She has published many research papers in peer-reviewed reputed international journals and conferences. She has been a resource person in various FDPs, workshops, guest lectures, and seminars. She is a CCNA certified instructor and has also done certifications in Data Scientist Tools, Exploratory Data Analysis, and Getting and Cleaning Data from Johns Hopkins University. She is a Lifetime member of ISTE. She is a CISCO-certified training instructor for CCNA modules 1, 2, 3, and 4. She has been appointed Advanced Level Instructor this year. She received an appreciation from Cisco Networking Academy for 5 years' active participation. She also set up a CISCO Networking Academy and developed a CISCO lab at NCU, Gurgaon in January 2014.
1. A reliable blockchain application for Music in a decentralized Network.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
1. A reliable blockchain application for Music in a decentralized Network.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.
2. An authentic data centric application for medical store. 3. Intelligent
Data Analytic Approach for Restaurant Recommendation. 4. Investigation on
Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding
Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical
encryption of images using partial pivoting lower upper decomposition based
on two structured deterministic phase masks in the hybrid transform domain.
7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8.
Blockchain: A next power-driven technology for smart cities. 9. Mutual surf
scaling factor features analysis for detecting DDOS attacks based on
lattice behavioral using spread spectral soft-max-recurrent neural network.
10. Provably Secure Role Delegation Scheme for Medical Cyber Physical
System. 11. FRAME Routing Protocol to handle security attacks in Wireless
Sensor Networks. 12. A Blockchain security management based Rehashing shift
code Rail encryption using circular shift round random padding key for
decentralized cloud environment. 13. Application of Exact Barrier-Penalty
Function for developing privacy mechanism in cyber physical system.