Computer and Network Security Essentials Front Cover

Computer and Network Security Essentials

  • Length: 618 pages
  • Edition: 1st ed. 2018
  • Publisher:
  • Publication Date: 2017-08-13
  • ISBN-10: 3319584235
  • ISBN-13: 9783319584232
  • Sales Rank: #4086733 (See Top 100 Books)
Description

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the book’s website at Springer.com.

Table of Contents

Part I Computer Security
Chapter 1 Computer Security
Chapter 2 A Survey And Taxonomy Of Classifiers Of Intrusion Detection Systems
Chapter 3 A Technology For Detection Of Advanced Persistent Threat In Networks And Systems Using A Finite Angular State Velocity Machine And Vector Mathematics
Chapter 4 Information-Theoretically Secure Privacy Preserving Approaches For Collaborative Association Rule Mining
Chapter 5 A Postmortem Forensic Analysis For A Javascript Based Attack

Part II Network Security
Chapter 6 Malleable Cryptosystems And Their Applications In Wireless Sensor Networks
Chapter 7 A Survey And Taxonomy On Data And Pre-Processing Techniques Of Intrusion Detection Systems
Chapter 8 Security Protocols For Networks And Internet: A Global Vision
Chapter 9 Differentiating Security From Privacy In Internet Of Things: A Survey Of Selected Threats And Controls
Chapter 10 Reliable Transmission Protocol For Underwater Acousticnetworks
Chapter 11 Using Sports Plays To Configure Honeypots Environments To Form A Virtual Security Shield

Part III Cryptographic Technologies
Chapter 12 Security Threats And Solutions For Two-Dimensional Barcodes: A Comparative Study
Chapter 13 Searching Encrypted Data On The Cloud
Chapter 14 A Strong Single Sign-On User Authentication Scheme Using Mobile Token Without Verifier Table For Cloud Based Services
Chapter 15 Review Of The Main Security Threats And Challenges In Free-Access Public Cloud Storage Servers
Chapter 16 Secure Elliptic Curves In Cryptography
Chapter 17 Mathematical Models For Malware Propagation In Wireless Sensor Networks: An Analysis

Part IV Biometrics and Forensics
Chapter 18 Biometric Systems For User Authentication
Chapter 19 Biometric Authentication And Data Security In Cloud Computing
Chapter 20 Approximate Search In Digital Forensics
Chapter 21 Privacy Preserving Internet Browsers: Forensic Analysisof Browzar

Part V Hardware Security
Chapter 22 Experimental Digital Forensics Of Subscriber Identification Module (Sim) Card
Chapter 23 A Dynamic Area-Efficient Technique To Enhance Ropufs Security Against Modeling Attacks
Chapter 24 Physical Unclonable Functions (Pufs) Design Technologies: Advantages And Trade Offs

Part VI Security Applications
Chapter 25 Generic Semantics Specification And Processing For Inter-System Information Flow Tracking
Chapter 26 On Inferring And Characterizing Large-Scale Probing And Ddos Campaigns
Chapter 27 Design Of A Secure Framework For Session Mobilityas A Service In Cloud Computing Environment

Part VII Security Management
Chapter 28 Securing The Internet Of Things: Best Practices For Deploying Iot Devices
Chapter 29 Cognitive Computing And Multiscale Analysis For Cyber Security
Chapter 30 A Comparative Study Of Neural Network Training Algorithmsfor The Intelligent Security Monitoring Of Industrial Controlsystems
Chapter 31 Cloud Computing: Security Issues And Establishing Virtual Cloud Environment Via Vagrant To Secure Cloud Hosts
Chapter 32 A Survey And Comparison Of Performance Evaluation In Intrusion Detection Systems
Chapter 33 Accountability For Federated Clouds
Chapter 34 A Cognitive And Concurrent Cyber Kill Chain Model
Chapter 35 Defense Methods Against Social Engineering Attacks

To access the link, solve the captcha.