Details

Title: Countering cyber attacks and preserving the integrity and availability of critical systems
Other creators: Geetha S.,; Phamila Asnath Victy
Collection: Электронные книги зарубежных издательств; Общая коллекция
Subjects: Computer networks — Security measures.; Computer crimes — Prevention.; Computer security.; COMPUTERS / Security / General.; COMPUTERS / Security / Networking.; EBSCO eBooks
Document type: Other
File type: PDF
Language: English
Rights: Доступ по паролю из сети Интернет (чтение, печать, копирование)
Record key: on1083671417

Allowed Actions:

pdf/2013190.pdf
Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network
epub/2013190.epub
Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Annotation

"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--.

Document access rights

Network User group Action
ILC SPbPU Local Network All Read Print Download
Internet Authorized users SPbPU Read Print Download
-> Internet Anonymous

Table of Contents

  • Cover
  • Title Page
  • Copyright Page
  • Book Series
  • Editorial Advisory Board
  • Table of Contents
  • Detailed Table of Contents
  • Foreword
  • Preface
  • Acknowledgment
  • Section 1: National Security and Cyber Warfare
    • Chapter 1: Digital Forensics and Cyber Law Enforcement
    • Chapter 2: The Fundamentals of Digital Forensics and Cyber Law
    • Chapter 3: An Indian and Global Perspective on Cybercrime
    • Chapter 4: Smart Video Surveillance Systems and Identification of Human Behavior Analysis
  • Section 2: Critical IoT Infrastructure Security
    • Chapter 5: IoT Evolution and Security Challenges in Cyber Space
    • Chapter 6: Network Intrusion Detection and Prevention Systems for Attacks in IoT Systems
    • Chapter 7: Study on Query-Based Information Extraction in IoT-Integrated Wireless Sensor Networks
    • Chapter 8: Lightweight Secure Architectural Framework for Internet of Things
  • Section 3: Emerging Trends and Methods for Cyber Forensics
    • Chapter 9: The Role of Artificial Intelligence in Cyber Security
    • Chapter 10: Techniques for Analysis of Mobile Malware
    • Chapter 11: Intelligent Malware Detection Using Deep Dilated Residual Networks for Cyber Security
    • Chapter 12: Security Framework for Smart Visual Sensor Networks
  • Section 4: Techniques for Countering Cyber Attacks
    • Chapter 13: Blockchain Technology Is a Boost to Cyber Security
    • Chapter 14: Secured Information Exchange Using Haptic Codes
    • Chapter 15: Real-Time ECG-Based Biometric Authentication System
    • Chapter 16: Digital Healthcare Security Issues
  • Compilation of References
  • About the Contributors
  • Index

Usage statistics

pdf/2013190.pdf

stat Access count: 0
Last 30 days: 0
Detailed usage statistics

epub/2013190.epub

stat Access count: 0
Last 30 days: 0
Detailed usage statistics