Детальная информация

Название Cyber security and threats: concepts, methodologies, tools, and applications
Организация Information Resources Management Association,
Коллекция Электронные книги зарубежных издательств ; Общая коллекция
Тематика Internet — Security measures. ; Computer crimes — Prevention. ; COMPUTERS / Security / General. ; EBSCO eBooks
Тип документа Другой
Тип файла PDF
Язык Английский
Права доступа Доступ по паролю из сети Интернет (чтение, печать, копирование)
Ключ записи on1029759943
Дата создания записи 29.03.2018

Разрешенные действия

pdf/1741780.pdf
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
epub/1741780.epub
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа Анонимные пользователи
Сеть Интернет

"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"--.

Место доступа Группа пользователей Действие
Локальная сеть ИБК СПбПУ Все
Прочитать Печать Загрузить
Интернет Авторизованные пользователи СПбПУ
Прочитать Печать Загрузить
Интернет Анонимные пользователи
  • Title Page
  • Copyright Page
  • Editorial Advisory Board
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Fundamental Concepts and Theories
    • Chapter 1: Role of Cyber Security in Today's Scenario
    • Chapter 2: Reconceptualising Cyber Security
    • Chapter 3: A Comprehensive Study of Security in Cloud Computing
    • Chapter 4: Security Aspects in Cloud Computing
    • Chapter 5: Cloud Security Issues and Challenges
    • Chapter 6: Cloud Security Engineering Concept and Vision
    • Chapter 7: Security and Compliance
    • Chapter 8: Economics of Cyber Security and the Way Forward
    • Chapter 9: Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat
    • Chapter 10: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
    • Chapter 11: A Survey
    • Chapter 12: A Need for Cyber Security Creativity
  • Section 2: Development and Design Methodologies
    • Chapter 13: Cyber Attacks and Preliminary Steps in Cyber Security in National Protection
    • Chapter 14: Assessing Security With Regard to Cloud Applications in STEM Education
    • Chapter 15: Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences
    • Chapter 16: Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    • Chapter 17: The Development of Cybersecurity Policy and Legislative Landscape in Latin America and Caribbean States
    • Chapter 18: Cooperation and Free Riding in Cyber Security Information-Sharing Programs
    • Chapter 19: Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
    • Chapter 20: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
    • Chapter 21: Visual Cryptography for Securing Images in Cloud
    • Chapter 22: Security Issues in Distributed Computing System Models
    • Chapter 23: Migration Goals and Risk Management in Cloud Computing
    • Chapter 24: The Rigorous Security Risk Management Model
    • Chapter 25: Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures
    • Chapter 26: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
    • Chapter 27: Mobile Cloud Computing Security Frameworks
    • Chapter 28: Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer
    • Chapter 29: Exploring Information Security Governance in Cloud Computing Organisation
    • Chapter 30: Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
    • Chapter 31: Big Data Security Framework for Distributed Cloud Data Centers
    • Chapter 32: Cyber Terrorism Taxonomies
    • Chapter 33: CYRAN
    • Chapter 34: TVGuarder
    • Chapter 35: A Conceptual Security Framework for Cloud Computing Issues
  • Section 3: Tools and Technologies
    • Chapter 36: Flow-Graph and Markovian Methods for Cyber Security Analysis
    • Chapter 37: DNA Cryptography
    • Chapter 38: Security Architecture for Cloud Computing
    • Chapter 39: Applications of Digital Signature Certificates for Online Information Security
    • Chapter 40: Web Services Gateway
    • Chapter 41: Quantum Cryptography
    • Chapter 42: A Novel Ammonic Conversion Algorithm for Securing Data in DNA Using Parabolic Encryption
    • Chapter 43: Monitoring and Auditing in the Cloud
    • Chapter 44: Secure Key Establishment in Wireless Sensor Networks
  • Section 4: Utilization and Applications
    • Chapter 45: Secure Architecture for Cloud Environment
    • Chapter 46: Security Problems in Cloud Computing Environments
    • Chapter 47: Cyber Security Centres for Threat Detection and Mitigation
    • Chapter 48: Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security
    • Chapter 49: Cyber-Security Concerns With Cloud Computing
    • Chapter 50: Security Management in Mobile Cloud Computing
    • Chapter 51: Identifying and Analyzing the Latent Cyber Threats in Developing Economies
    • Chapter 52: Cyber Space Security Assessment Case Study
    • Chapter 53: Navigating Through Choppy Waters of PCI DSS Compliance
    • Chapter 54: Israel's Cyber Security Policy
    • Chapter 55: Pragmatic Solutions to Cyber Security Threat in Indian Context
    • Chapter 56: Chaotic Map for Securing Digital Content
    • Chapter 57: SCIPS
  • Section 5: Organizational and Social Implications
    • Chapter 58: Cyber Threats in Civil Aviation
    • Chapter 59: Cyber Security and Business Growth
    • Chapter 60: Security Issues Related to Cloud Applications in STEM Education
    • Chapter 61: Cyber Security Risks in Robotics
    • Chapter 62: Security and Trust in Cloud Computing
    • Chapter 63: Recent Developments in Cryptography
    • Chapter 64: Cybersecurity and Data Breaches at Schools
    • Chapter 65: Managing Risk in Cloud Computing
    • Chapter 66: Cloud Crime and Fraud
  • Section 6: Critical Issues and Challenges
    • Chapter 67: Legal Issues
    • Chapter 68: Cloud Storage Privacy and Security User Awareness
    • Chapter 69: Analysis of Cyber-Attacks Against the Transportation Sector
    • Chapter 70: Can Total Quality Management Exist in Cyber Security
    • Chapter 71: Mitigating Unconventional Cyber-Warfare
    • Chapter 72: Proposals to Win the Battle Against Cyber Crime
    • Chapter 73: Cyber-Security Intelligence Gathering
    • Chapter 74: A Comparative Study on DNA-Based Cryptosystem
    • Chapter 75: Security of the Cloud
    • Chapter 76: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict
  • Section 7: Emerging Trends
    • Chapter 77: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare
    • Chapter 78: Exploring Cyber Security Vulnerabilities in the Age of IoT
    • Chapter 79: Recent Trends in Cloud Computing Security Issues and Their Mitigation
    • Chapter 80: The Need for a National Data Breach Notification Law
    • Chapter 81: Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing
    • Chapter 82: Trends in Peace Research
  • Index
pdf/1741780.pdf

Количество обращений: 7 
За последние 30 дней: 1

Подробная статистика

epub/1741780.epub

Количество обращений: 1 
За последние 30 дней: 0

Подробная статистика