Green Computing in Network Security, Sharma, Deepak Kumar
Автор: Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Saqib Saeed, Yousaf Bin Zikria Название: Cybersecurity Issues and Challenges for Business and FinTech Applications ISBN: 1668452847 ISBN-13(EAN): 9781668452844 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 42134.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. The book covers a range of topics, including artificial intelligence, social commerce, and data leakage.
Автор: Abdullah M. Almuhaideb, Neeraj Kumar, Noor Zaman, Saqib Saeed, Yousaf Bin Zikria Название: Cybersecurity Issues and Challenges for Business and FinTech Applications ISBN: 1668452855 ISBN-13(EAN): 9781668452851 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 31878.00 р. Наличие на складе: Нет в наличии.
Описание: Discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. The book covers a range of topics, including artificial intelligence, social commerce, and data leakage.
Название: Green computing in network security ISBN: 0367562928 ISBN-13(EAN): 9780367562922 Издательство: Taylor&Francis Рейтинг: Цена: 17609.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book focuses on green computing-based network security techniques and addresses the challenges involved in practical implementation. It also explores the idea of energy-efficient computing for network and data security and covers the security threats involved in social networks, data centers, IoT, and biomedical applications.
Автор: Kizza Joseph Migga Название: Computer Network Security and Cyber Ethics ISBN: 0786493925 ISBN-13(EAN): 9780786493920 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 4990.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions of morality and ethics. The reader will gain an understanding of how the security of information in general and of computer networks in particular, on which our national critical infrastructure and, indeed, our lives depend, is based squarely on the individuals who build the hardware and design and develop the software that run the networks that store our vital information. Addressing security issues with ever-growing social networks are two new chapters: "Security of Mobile Systems" and "Security in the Cloud Infrastructure." Instructors considering this book for use in a course may request an examination copy here.
Автор: Maciej Grzenda; Ali Ismail Awad; Janusz Furtak; Ja Название: Advances in Network Systems ISBN: 3319443526 ISBN-13(EAN): 9783319443522 Издательство: Springer Рейтинг: Цена: 27950.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.
Автор: Dengguo Feng Название: Trusted Computing: Principles and Applications ISBN: 3110476045 ISBN-13(EAN): 9783110476040 Издательство: Walter de Gruyter Рейтинг: Цена: 18586.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Автор: Reis Catarina I., Maximiano Marisa Da Silva Название: Internet of Things and Advanced Application in Healthcare ISBN: 1522518207 ISBN-13(EAN): 9781522518204 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 30631.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications.Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications.Topics Covered:Assistive TechnologiesContext-Aware Computing SystemsHealth Risk ManagementHealthcare Support SystemsReliability ConcernsSmart HealthcareWearable Sensors
Автор: Larsen Per, Sadeghi Ahmad-Reza Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses ISBN: 1970001801 ISBN-13(EAN): 9781970001808 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 10352.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Автор: Per Larsen, Ahmad-Reza Sadeghi Название: The Continuing Arms Race: Code-Reuse Attacks and Defenses ISBN: 1970001836 ISBN-13(EAN): 9781970001839 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 12835.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: As human activities moved to the digital domain, so did all the well-known malicious behaviors including fraud, theft, and other trickery. There is no silver bullet, and each security threat calls for a specific answer. One specific threat is that applications accept malformed inputs, and in many cases it is possible to craft inputs that let an intruder take full control over the target computer system.The nature of systems programming languages lies at the heart of the problem. Rather than rewriting decades of well-tested functionality, this book examines ways to live with the (programming) sins of the past while shoring up security in the most efficient manner possible. We explore a range of different options, each making significant progress towards securing legacy programs from malicious inputs.The solutions explored include enforcement-type defenses, which excludes certain program executions because they never arise during normal operation. Another strand explores the idea of presenting adversaries with a moving target that unpredictably changes its attack surface thanks to randomization. We also cover tandem execution ideas where the compromise of one executing clone causes it to diverge from another thus revealing adversarial activities. The main purpose of this book is to provide readers with some of the most influential works on run-time exploits and defenses. We hope that the material in this book will inspire readers and generate new ideas and paradigms.
Описание: The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. <br><br><em>Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection</em> provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyses the technical, procedural, and managerial responses to securing these systems.
Описание: Situational Awareness in Computer Network Defense: Principles, Methods and Applications provides academia and organizations insights into practical and applied solutions, frameworks, technologies, and implementations for situational awareness in computer networks. This book presents situational awareness solutions in Computer Network Defense (CND) currently being researched or deployed. The key objective is to fill a gap that exists in the way CND and security are being approached by formalizing the use of situational awareness in computer network security and defense.
Описание: Presents integrated (cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, the book introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru