Описание: Detailing the latest and most important advances in security standards, this introduces the differences between information security and network security. In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).
Описание: Cyber-attacks are rapidly becoming one of the most prevalent issues globally, and as they continue to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. Beyond cyber-attacks, personal information is now routinely and exclusively housed in cloud-based systems. The rising use of information technologies requires stronger information security and system procedures to reduce the risk of information breaches.Advanced Methodologies and Technologies in System Security, Information Privacy, and Forensics presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combatting digital risks and cyber threats. This book is an important resource for information technology professionals, cybercrime researchers, network analysts, government agencies, business professionals, academicians, and practitioners seeking the most up-to-date information and methodologies on cybercrime, digital terrorism, network security, and information technology ethics.
Описание: To facilitate scalability and resilience, many organizations now run applications in cloud native environments using containers and orchestration. This practical book examines key underlying technologies to help developers, operators, and security professionals assess security risks and determine appropriate solutions.
Автор: Dengguo Feng Название: Trusted Computing: Principles and Applications ISBN: 3110476045 ISBN-13(EAN): 9783110476040 Издательство: Walter de Gruyter Рейтинг: Цена: 18586.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Описание: This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2020, held in Regensburg, Germany, in June 2020.*The 14 full papers and 8 short papers presented were carefully reviewed and selected from 39 submissions.
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing for Security, Privacy, and Applications ISBN: 3030573273 ISBN-13(EAN): 9783030573270 Издательство: Springer Цена: 20962.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"
Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India
Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)
Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)
Part V: Applications of Fog/Edge Computing
12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"
G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)
Vinay Chamola (BITS Pilani, Pilani Campus,
Автор: Chang Wei, Wu Jie Название: Fog/Edge Computing For Security, Privacy, and Applications ISBN: 3030573303 ISBN-13(EAN): 9783030573300 Издательство: Springer Рейтинг: Цена: 20962.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Part I: Overview of Fog/Edge Computing
1. "Confluence of 4G LTE, 5G, fog, and cloud computing and understanding security issues"
Khaldoon Alshouiliy (University of Cincinnati, USA)
Dharma Agrawal (University of Cincinnati, USA)
2. "An overview of the Edge Computing in Modern Digital Age"
Reinaldo Padilha Franзa (University of Campinas- UNICAMP, Brazil)
Ana Carolina Borges Monteiro (University of Campinas- UNICAMP, Brazil)
Rangel Arthur (University of Campinas- UNICAMP, Brazil)
Yuzo Lano (University of Campinas- UNICAMP, Brazil)
Part II: Security in Fog/Edge Computing
3. "Secure Search and Storage Services in Fog/Edge Computing"
Qin Liu (Hunan University, China)
4. "Collaborative Intrusion Detection Schemes in Fog-to-Things Computing"
Abebe Diro (La Trobe University, Australia)
Abdun Mahmood (La Trobe University, Australia)
Naveen Chilamkurti (La Trobe University, Australia)
5. "On the Feasibility of Byzantine Agreement to Secure Fog/Edge Data Management"
Ali Shoker (VORTEX Colab, Portugal)
Hussam Yactine (INESC TEC and Universidade do Minho, Portugal)
Part III: Privacy in Fog/Edge Computing
6. "Privacy Issues in Edge Computing"
Qi Xia (College of William and Mary, USA)
Zeyi Tao (College of William and Mary, USA)
Qun Li (College of William and Mary, USA)
7. "Privacy-preserving Edge Video Analytics"
Miao Hu (Sun Yat-sen University, China)
Yao Fu (Sun Yat-sen University, China)
Di Wu (Sun Yat-sen University, China)
Part IV: Architectural Design in Fog/Edge Computing
8. "Vulnerabilities in Fog/Edge Computing from Architectural Perspectives"
Nhu-Ngoc Dao (Sejong University, South Korea)
Ngoc-Thanh Dinh (Soongsil University, South Korea)
Quoc-Viet Pham (Pusan National University, South Korea)
Trung V. Phan (Technische Universitдt Chemnitz, Germany)
Sungrae Cho (Chung-Ang University, South Korea)
Torsten Braun (University of Bern, Switzerland)
9. "Security and Intelligent Management for Fog/Edge Computing Resources"
Jun Wu (Shanghai Jiao Tong University, China)
10. "Algorithms for NFV-Enabled Multicasting in Mobile Edge Computing"
Zichuan Xu (Dalian University of Technology, China)
Weifa Liang (The Australian National University, Australia)
11. "Blockchain-based Security Services for Fog Computing"
Pramod Patil (Dr. Babasaheb Ambedkar Technological University, India
Laxman D. Netak (Dr. Babasaheb Ambedkar Technological University, India)
Sanjay U Waikar (Dr. Babasaheb Ambedkar Technological University, India)
Part V: Applications of Fog/Edge Computing
12. "Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions"
G. S. S. Chalapathi (BITS Pilani, Pilani Campus, India, and The University of Melbourne, Australia)
Vinay Chamola (BITS Pilani, Pilani Campus,
Автор: Kuan-Ching Li; Xiaofeng Chen; Willy Susilo Название: Advances in Cyber Security: Principles, Techniques, and Applications ISBN: 9811314829 ISBN-13(EAN): 9789811314827 Издательство: Springer Рейтинг: Цена: 22359.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides state-of-the-art coverage of the principles, techniques, and management of issues in cyber security, including threat attacks, privacy, signature and encryption schemes. One of the most important topics addressed concerns lightweight solutions for public key encryption in resource-constrained environments; the book highlights the latest developments in this area. Authentication is another central issue in cyber security. In this book, we address this aspect and sub-aspects ranging from cryptographic approaches to practical design issues, such as CAPTCHA. Privacy is another main topic that is discussed in detail, from techniques for enhancing privacy to pseudonymous schemes.Addressing key issues in the emerging field of cyber security, this book effectively bridges the gap between computer security and threat attacks, and showcases promising applications involving cryptography and security.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru