Details
Title | Cyber security and threats: concepts, methodologies, tools, and applications |
---|---|
Organization | Information Resources Management Association, |
Collection | Электронные книги зарубежных издательств ; Общая коллекция |
Subjects | Internet — Security measures. ; Computer crimes — Prevention. ; COMPUTERS / Security / General. ; EBSCO eBooks |
Document type | Other |
File type | |
Language | English |
Rights | Доступ по паролю из сети Интернет (чтение, печать, копирование) |
Record key | on1029759943 |
Record create date | 3/29/2018 |
Allowed Actions
pdf/1741780.pdf | – |
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
|
---|---|---|
epub/1741780.epub | – |
Action 'Download' will be available if you login or access site from another network
|
Group | Anonymous |
---|---|
Network | Internet |
"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"--.
Network | User group | Action |
---|---|---|
ILC SPbPU Local Network | All |
|
Internet | Authorized users SPbPU |
|
Internet | Anonymous |
|
- Title Page
- Copyright Page
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: Role of Cyber Security in Today's Scenario
- Chapter 2: Reconceptualising Cyber Security
- Chapter 3: A Comprehensive Study of Security in Cloud Computing
- Chapter 4: Security Aspects in Cloud Computing
- Chapter 5: Cloud Security Issues and Challenges
- Chapter 6: Cloud Security Engineering Concept and Vision
- Chapter 7: Security and Compliance
- Chapter 8: Economics of Cyber Security and the Way Forward
- Chapter 9: Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat
- Chapter 10: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
- Chapter 11: A Survey
- Chapter 12: A Need for Cyber Security Creativity
- Section 2: Development and Design Methodologies
- Chapter 13: Cyber Attacks and Preliminary Steps in Cyber Security in National Protection
- Chapter 14: Assessing Security With Regard to Cloud Applications in STEM Education
- Chapter 15: Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences
- Chapter 16: Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
- Chapter 17: The Development of Cybersecurity Policy and Legislative Landscape in Latin America and Caribbean States
- Chapter 18: Cooperation and Free Riding in Cyber Security Information-Sharing Programs
- Chapter 19: Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
- Chapter 20: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
- Chapter 21: Visual Cryptography for Securing Images in Cloud
- Chapter 22: Security Issues in Distributed Computing System Models
- Chapter 23: Migration Goals and Risk Management in Cloud Computing
- Chapter 24: The Rigorous Security Risk Management Model
- Chapter 25: Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures
- Chapter 26: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
- Chapter 27: Mobile Cloud Computing Security Frameworks
- Chapter 28: Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer
- Chapter 29: Exploring Information Security Governance in Cloud Computing Organisation
- Chapter 30: Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
- Chapter 31: Big Data Security Framework for Distributed Cloud Data Centers
- Chapter 32: Cyber Terrorism Taxonomies
- Chapter 33: CYRAN
- Chapter 34: TVGuarder
- Chapter 35: A Conceptual Security Framework for Cloud Computing Issues
- Section 3: Tools and Technologies
- Chapter 36: Flow-Graph and Markovian Methods for Cyber Security Analysis
- Chapter 37: DNA Cryptography
- Chapter 38: Security Architecture for Cloud Computing
- Chapter 39: Applications of Digital Signature Certificates for Online Information Security
- Chapter 40: Web Services Gateway
- Chapter 41: Quantum Cryptography
- Chapter 42: A Novel Ammonic Conversion Algorithm for Securing Data in DNA Using Parabolic Encryption
- Chapter 43: Monitoring and Auditing in the Cloud
- Chapter 44: Secure Key Establishment in Wireless Sensor Networks
- Section 4: Utilization and Applications
- Chapter 45: Secure Architecture for Cloud Environment
- Chapter 46: Security Problems in Cloud Computing Environments
- Chapter 47: Cyber Security Centres for Threat Detection and Mitigation
- Chapter 48: Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security
- Chapter 49: Cyber-Security Concerns With Cloud Computing
- Chapter 50: Security Management in Mobile Cloud Computing
- Chapter 51: Identifying and Analyzing the Latent Cyber Threats in Developing Economies
- Chapter 52: Cyber Space Security Assessment Case Study
- Chapter 53: Navigating Through Choppy Waters of PCI DSS Compliance
- Chapter 54: Israel's Cyber Security Policy
- Chapter 55: Pragmatic Solutions to Cyber Security Threat in Indian Context
- Chapter 56: Chaotic Map for Securing Digital Content
- Chapter 57: SCIPS
- Section 5: Organizational and Social Implications
- Chapter 58: Cyber Threats in Civil Aviation
- Chapter 59: Cyber Security and Business Growth
- Chapter 60: Security Issues Related to Cloud Applications in STEM Education
- Chapter 61: Cyber Security Risks in Robotics
- Chapter 62: Security and Trust in Cloud Computing
- Chapter 63: Recent Developments in Cryptography
- Chapter 64: Cybersecurity and Data Breaches at Schools
- Chapter 65: Managing Risk in Cloud Computing
- Chapter 66: Cloud Crime and Fraud
- Section 6: Critical Issues and Challenges
- Chapter 67: Legal Issues
- Chapter 68: Cloud Storage Privacy and Security User Awareness
- Chapter 69: Analysis of Cyber-Attacks Against the Transportation Sector
- Chapter 70: Can Total Quality Management Exist in Cyber Security
- Chapter 71: Mitigating Unconventional Cyber-Warfare
- Chapter 72: Proposals to Win the Battle Against Cyber Crime
- Chapter 73: Cyber-Security Intelligence Gathering
- Chapter 74: A Comparative Study on DNA-Based Cryptosystem
- Chapter 75: Security of the Cloud
- Chapter 76: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict
- Section 7: Emerging Trends
- Chapter 77: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare
- Chapter 78: Exploring Cyber Security Vulnerabilities in the Age of IoT
- Chapter 79: Recent Trends in Cloud Computing Security Issues and Their Mitigation
- Chapter 80: The Need for a National Data Breach Notification Law
- Chapter 81: Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing
- Chapter 82: Trends in Peace Research
- Index