Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments, Hassanien Aboul Ella, Elhoseny Mohamed


Варианты приобретения
Цена: 13974.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Hassanien Aboul Ella, Elhoseny Mohamed
Название:  Cybersecurity and Secure Information Systems: Challenges and Solutions in Smart Environments
ISBN: 9783030168391
Издательство: Springer
Классификация:


ISBN-10: 3030168395
Обложка/Формат: Paperback
Страницы: 314
Вес: 0.46 кг.
Дата издания: 14.08.2020
Серия: Advanced sciences and technologies for security applications
Язык: English
Издание: 1st ed. 2019
Иллюстрации: 50 tables, color; 95 illustrations, color; 33 illustrations, black and white; x, 314 p. 128 illus., 95 illus. in color.
Размер: 23.39 x 15.60 x 1.73 cm
Читательская аудитория: Tertiary education (us: college)
Подзаголовок: Challenges and solutions in smart environments
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources.


Cybersecurity for Industrial Control Systems

Название: Cybersecurity for Industrial Control Systems
ISBN: 1439801967 ISBN-13(EAN): 9781439801963
Издательство: Taylor&Francis
Рейтинг:
Цена: 12707.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: SCADA (Supervisory Control and Data Acquisition) systems do not necessarily mesh well with standard IT security. Nevertheless, when combined, the two can create heightened levels of protection. This book demonstrates how to develop a SCADA cyber security program.

Innovative Security Solutions for Information Technology and Communications

Автор: Pooya Farshim; Emil Simion
Название: Innovative Security Solutions for Information Technology and Communications
ISBN: 3319692836 ISBN-13(EAN): 9783319692838
Издательство: Springer
Рейтинг:
Цена: 7685.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
The 6 revised full papers presented together with 7 invited talks were carefully reviewed and selected from 22 submissions. The papers present advances in the theory, design, implementation, analysis, verification, or evaluation of secure systems and algorithms.

Cybersecurity and Secure Information Systems

Автор: Aboul Ella Hassanien; Mohamed Elhoseny
Название: Cybersecurity and Secure Information Systems
ISBN: 3030168360 ISBN-13(EAN): 9783030168360
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analysis, as well as advances in digital forensics, secure smart city services, and risk mitigation strategies for devices employing cyber-physical systems. Given its scope, the book offers a valuable resource for students, researchers, IT professionals and providers, citizens, consumers and policymakers involved or interested in the modern security procedures needed to protect our information and communication resources. Its goal is to foster a community committed to further research and education, and one that can also translate its findings into concrete practices.

Social Tagging for Linking Data Across Environments

Автор: Pennington Diane
Название: Social Tagging for Linking Data Across Environments
ISBN: 1783303387 ISBN-13(EAN): 9781783303380
Издательство: Facet
Рейтинг:
Цена: 16368.00 р.
Наличие на складе: Нет в наличии.

Описание: This book, representing researchers and practitioners across different information professions, will explore how social tags can link content across a variety of environments.

Theory And Practice Of Cryptography Solutions For Secure Information Syste

Автор: El?i, Pieprzyk, Chefranov, Orgun
Название: Theory And Practice Of Cryptography Solutions For Secure Information Syste
ISBN: 1466640308 ISBN-13(EAN): 9781466640306
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: <em>Theory and Practice of Cryptography Solutions for Secure Information Systems</em> explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the <em>Advances in Information Security, Privacy, and Ethics series collection</em>.

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Автор: Dykstra Josiah
Название: Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems
ISBN: 1491920947 ISBN-13(EAN): 9781491920947
Издательство: Wiley
Рейтинг:
Цена: 6334.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: If you`re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems.

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Автор: Issa Traore; Isaac Woungang; Sherif Saad Ahmed; Ya
Название: Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
ISBN: 3030037118 ISBN-13(EAN): 9783030037116
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the refereed proceedings of the Second International Conference on Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, ISDDC 2018, held in Vancouver, BC, Canada, in November 2018.The 10 full papers were carefully reviewed and selected from 28 submissions. This book also contains the abstracts of two keynote talks and one tutorial. The contributions included in this proceedings cover many aspects of theory and application of effective and efficient paradigms, approaches, and tools for building, maintaining, and managing secure and dependable systems and infrastructures, such as botnet detection, secure cloud computing and cryptosystems, IoT security, sensor and social network security, behavioral systems and data science, and mobile computing.

The Complete Guide to Cybersecurity Risks and Controls

Автор: Kohnke
Название: The Complete Guide to Cybersecurity Risks and Controls
ISBN: 1498740545 ISBN-13(EAN): 9781498740548
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to create a working, practical control structure that will ensure the ongoing, day-to-day trustworthiness of ICT systems and data. The book explains how to establish systematic control functions and timely reporting procedures within a standard organizational framework and how to build auditable trust into the routine assurance of ICT operations.

The book is based on the belief that ICT operation is a strategic governance issue rather than a technical concern. With the exponential growth of security breaches and the increasing dependency on external business partners to achieve organizational success, the effective use of ICT governance and enterprise-wide frameworks to guide the implementation of integrated security controls are critical in order to mitigate data theft. Surprisingly, many organizations do not have formal processes or policies to protect their assets from internal or external threats.

The ICT governance and control process establishes a complete and correct set of managerial and technical control behaviors that ensures reliable monitoring and control of ICT operations. The body of knowledge for doing that is explained in this text. This body of knowledge process applies to all operational aspects of ICT responsibilities ranging from upper management policy making and planning, all the way down to basic technology operation.

Implementing Cybersecurity

Автор: Kohnke
Название: Implementing Cybersecurity
ISBN: 149878514X ISBN-13(EAN): 9781498785143
Издательство: Taylor&Francis
Рейтинг:
Цена: 18374.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational risk management. It is an all-purpose roadmap of sorts aimed at the practical understanding and implementation of the risk management process as a standard entity. It will enable an "application" of the risk management process as well as the fundamental elements of control formulation within an applied context.

Integrity Primitives for Secure Information Systems

Автор: Antoon Bosselaers; Bart Preneel
Название: Integrity Primitives for Secure Information Systems
ISBN: 3540606408 ISBN-13(EAN): 9783540606406
Издательство: Springer
Рейтинг:
Цена: 9781.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. Among the issues addressed are security services, integrity mechanisms, data origin authentication, entity authentication, access control, data integrity, non-repudiation, signatures, and key exchange.

Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing

Автор: Grid Alan
Название: Cybersecurity: Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing
ISBN: 1914045084 ISBN-13(EAN): 9781914045080
Издательство: Неизвестно
Рейтинг:
Цена: 4414.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Why Straitening Your Cybersecurity is Crucial in 2020 ? If You are Looking to Protect Your Data and Sleep More Peacefully at Night Read On...


Cyber-crime nowadays is continuously rising, and many individuals or smaller businesses are facing problems due to ineffective Cybersecurity, people feel that their data is safe, but even companies are attacked daily. It might be offensive to hear, but most cyber-criminals will have much more expertise than you or your average employee when it comes to digital crime; They can sell your data on the black market or use it for personal goals like: extract your bank information. There are also other personal reasons, such as ego, others appreciation and personal satisfaction.


We've scoured the entire Cybersecurity world, researching the practices of both security experts and ordinary Internet users like ourselves. Our recommendations cover the most significant threats you or your business face and show you the best methods for protecting your identity and personal data.

Each subtopic of this book has been explored in great depth to sensitize you about cybersecurity and how it is going to affect international relations and geopolitical situations across the world.

It covers the following topics:


  • What is Cyber Security?
  • The 5 Most Common Mistakes in Cybersecurity
  • Cyber Attacks and Vulnerabilities
  • Systems That Are Vulnerable to Cyber-Attacks
  • Improving Effectively Your Security
  • What does it mean to be an Ethical Hacker?
  • How to Inhibits Adware


...And much more

This book is for anyone who has an interest in Cybersecurity. You don't need to have any prior knowledge of it . You should just need to have a working knowledge of computers and the internet.

With this guide, we want to give you a simple, effective, and realistic framework for Boosting your Cybersecurity-one that you can achieve quickly.

Ready to Improve Your Cybersecurity? Click "Buy Now"


Challenges in Cybersecurity and Privacy - the European Research Landscape

Автор: Jorge Bernal Bernabe, Antonio Skarmeta
Название: Challenges in Cybersecurity and Privacy - the European Research Landscape
ISBN: 8770220883 ISBN-13(EAN): 9788770220880
Издательство: Taylor&Francis
Рейтинг:
Цена: 14086.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия