Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Green Computing in Network Security, Sharma, Deepak Kumar


Варианты приобретения
Цена: 7042.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Sharma, Deepak Kumar
Название:  Green Computing in Network Security
ISBN: 9780367562939
Издательство: Taylor&Francis
Классификация:

















ISBN-10: 0367562936
Обложка/Формат: Paperback
Страницы: 172
Вес: 0.30 кг.
Дата издания: 07.10.2024
Серия: Green Engineering and Technology
Иллюстрации: 15 tables, black and white; 27 line drawings, black and white; 24 halftones, black and white; 51 illustrations, black and white
Размер: 234 x 156
Основная тема: Machine Learning
Подзаголовок: Energy Efficient Solutions for Business and Home
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание: This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications. Green Computing in Network Security: Energy Efficient Solutions for Business and Home includes analysis of green-security mechanisms and explores the role of green computing for secured modern internet applications. It discusses green computing-based distributed learning approaches for security and emphasizes the development of green computing-based security systems for IoT devices.Written with researchers, academic libraries, and professionals in mind so they can get up to speed on network security, the challenges, and implementation processes.
Дополнительное описание: 1. Analysis of Green-Security Mechanisms for Future Networks. 2. Design of Green-Aware Security Mechanisms for Modern Internet Applications. 3. Data Security in Green Computing Platforms for Biomedical Systems. 4. Green Computing for Cryptography and Cryp



Cybersecurity Issues and Challenges for Business and FinTech Applications

Автор: Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Saqib Saeed, Yousaf Bin Zikria
Название: Cybersecurity Issues and Challenges for Business and FinTech Applications
ISBN: 1668452847 ISBN-13(EAN): 9781668452844
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 42134.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. The book covers a range of topics, including artificial intelligence, social commerce, and data leakage.

Автор: Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Saqib Saeed, Yousaf Bin Zikria
Название: Cybersecurity Issues and Challenges for Business and FinTech Applications
ISBN: 1668452855 ISBN-13(EAN): 9781668452851
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 31878.00 р.
Наличие на складе: Нет в наличии.

Описание: Discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. The book covers a range of topics, including artificial intelligence, social commerce, and data leakage.

Green computing in network security

Название: Green computing in network security
ISBN: 0367562928 ISBN-13(EAN): 9780367562922
Издательство: Taylor&Francis
Рейтинг:
Цена: 17609.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications.

Computer Network Security and Cyber Ethics

Автор: Kizza Joseph Migga
Название: Computer Network Security and Cyber Ethics
ISBN: 0786493925 ISBN-13(EAN): 9780786493920
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 4990.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: "Security of Mobile Systems" and "Security in the Cloud Infrastructure." Instructors considering this book for use in a course may request an examination copy here.

Advances in Network Systems

Автор: Maciej Grzenda; Ali Ismail Awad; Janusz Furtak; Ja
Название: Advances in Network Systems
ISBN: 3319443526 ISBN-13(EAN): 9783319443522
Издательство: Springer
Рейтинг:
Цена: 27950.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Trusted Computing: Principles and Applications

Автор: Dengguo Feng
Название: Trusted Computing: Principles and Applications
ISBN: 3110476045 ISBN-13(EAN): 9783110476040
Издательство: Walter de Gruyter
Рейтинг:
Цена: 18586.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.

Internet of Things and Advanced Application in Healthcare

Автор: Reis Catarina I., Maximiano Marisa Da Silva
Название: Internet of Things and Advanced Application in Healthcare
ISBN: 1522518207 ISBN-13(EAN): 9781522518204
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 30631.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications.Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications.Topics Covered:Assistive TechnologiesContext-Aware Computing SystemsHealth Risk ManagementHealthcare Support SystemsReliability ConcernsSmart HealthcareWearable Sensors

The Continuing Arms Race: Code-Reuse Attacks and Defenses

Автор: Larsen Per, Sadeghi Ahmad-Reza
Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 1970001801 ISBN-13(EAN): 9781970001808
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 10352.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

The Continuing Arms Race: Code-Reuse Attacks and Defenses

Автор: Per Larsen, Ahmad-Reza Sadeghi
Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses
ISBN: 1970001836 ISBN-13(EAN): 9781970001839
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 12835.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Автор: Christopher Laing, Atta Badii, Paul Vickers
Название: Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
ISBN: 1466626593 ISBN-13(EAN): 9781466626591
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.

Situational Awareness in Computer Network Defense: Principles, Methods and Applications

Автор: Cyril Onwubiko, Thomas Owens
Название: Situational Awareness in Computer Network Defense: Principles, Methods and Applications
ISBN: 1466601043 ISBN-13(EAN): 9781466601048
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks. This book presents situational awareness solutions in Computer Network Defense (CND) currently being researched or deployed. The key objective is to fill a gap that exists in the way CND and security are being approached by formalizing the use of situational awareness in computer network security and defense.

Cyber-physical threat intelligence for critical infrastructures security

Название: Cyber-physical threat intelligence for critical infrastructures security
ISBN: 1680836862 ISBN-13(EAN): 9781680836868
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 12335.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Presents integrated (cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, the book introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия