Computer and Network Security Essentials
امنیت کامپیوتر می تواند به عنوان مجموعه ای از مکانیسم هایی که از سیستم های کامپیوتری در مقابل دسترسی های غیرمجاز، سرقت، آسیب و اختلال در خدمات محافظت می کند، در نظر گرفته شود. این شامل حفاظت از تهدیدات داخلی و خارجی می شود. تهدید داخلی می تواند در یک برنامه نرم افزاری یا سیستم عامل جریان یابد. تهدیدات خارجی شامل دسترسی غیرمجاز یا خطای انسانی می شود.
سرفصل ها:
Part I Computer Security
CH 1 Computer Security
CH 2 A Survey and Taxonomy of Classifiers of Intrusion DetectionSystems
CH 3 A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State VelocityMachine and Vector Mathematics
CH 4 Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining
CH 5 A Postmortem Forensic Analysis for a JavaScript Based Attack
Part II Network Security
CH 6 Malleable Cryptosystems and Their Applications in WirelessSensor Networks
CH 7 A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems
CH 8 Security Protocols for Networks and Internet: A Global Vision in Digital Forensics
CH 9 Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls
CH 10 Reliable Transmission Protocol for Underwater Acoustic Networks.
CH 11 Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield
Part III Cryptographic Technologies
CH 12 Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study
CH 13 Searching Encrypted Data on the Cloud
CH 14 A Strong Single Sign-on User Authentication Scheme Using
Mobile Token Without Verifier Table for Cloud Based Services
CH 15 Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers
CH 16 Secure Elliptic Curves in Cryptography
CH 17 Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis
Part IV Biometrics and Forensics
CH 18 Biometric Systems for User Authentication
CH 19 Biometric Authentication and Data Security in Cloud Computing
CH 20 Approximate Search in Digital Forensics
CH 21 Privacy Preserving Internet Browsers: Forensic Analysis of Browzar
Part V Hardware Security
CH 22 Experimental Digital Forensics of Subscriber Identification Module (SIM) Card
CH 23 A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks
CH 24 Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs
Part VI Security Applications
CH 25 Generic Semantics Specification and Processing for Inter-System Information Flow Tracking
CH 26 On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns
CH27 Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment
Part VII Security Management
CH 28 Securing the Internet of Things: Best Practices for Deploying IoT Devices
CH 29 Cognitive Computing and Multiscale Analysis for Cyber Security
CH 30 A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems
CH 31 Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts
CH 32 A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems
CH 33 Accountability for Federated Clouds
CH 34 A Cognitive and Concurrent Cyber Kill Chain Model
CH 35 Defense Methods Against Social Engineering Attacks
مشخصات:
نویسنده: Kevin Daimi
ناشر:Springer
سال نشر:2018
تعداد صفحات:608
حجم:8.4 MB