Strict Standards: mktime(): You should be using the time() function instead in /home/hivanet1/public_html/plugins/system/vvisit_counter/vvisit_counter.php on line 32

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/plugins/system/vvisit_counter/helper/vvisit_counter.php on line 28

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/plugins/system/vvisit_counter/helper/vvisit_counter.php on line 120

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/plugins/system/vvisit_counter/helper/vvisit_counter.php on line 123

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/plugins/system/vvisit_counter/vvisit_counter.php on line 38

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/plugins/system/vvisit_counter/vvisit_counter.php on line 92

Warning: Cannot modify header information - headers already sent by (output started at /home/hivanet1/public_html/plugins/system/vvisit_counter/vvisit_counter.php:32) in /home/hivanet1/public_html/plugins/system/jat3/jat3/core/parameter.php on line 107
Computer and Network Security Essentials

hiva-network.com

Hiva Library banner

 Computer and Network Security Essentials

Computer and Network Security Essentials

امنیت کامپیوتر می تواند به عنوان مجموعه ای از مکانیسم هایی که از سیستم های کامپیوتری در مقابل دسترسی های غیرمجاز، سرقت، آسیب و اختلال در خدمات محافظت می کند، در نظر گرفته شود. این شامل حفاظت از تهدیدات داخلی و خارجی می شود. تهدید داخلی می تواند در یک برنامه نرم افزاری یا سیستم عامل جریان یابد. تهدیدات خارجی شامل دسترسی غیرمجاز یا خطای انسانی می شود.

سرفصل ها:

Part I Computer Security

CH 1 Computer Security

CH 2 A Survey and Taxonomy of Classifiers of Intrusion DetectionSystems

CH 3 A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State VelocityMachine and Vector Mathematics

CH 4 Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining

CH 5 A Postmortem Forensic Analysis for a JavaScript Based Attack

Part II Network Security

CH 6 Malleable Cryptosystems and Their Applications in WirelessSensor Networks

CH 7 A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems

CH 8 Security Protocols for Networks and Internet: A Global Vision in Digital Forensics

CH 9 Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls

CH 10 Reliable Transmission Protocol for Underwater Acoustic Networks.

CH 11 Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield

Part III Cryptographic Technologies

CH 12 Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study

CH 13 Searching Encrypted Data on the Cloud

CH 14 A Strong Single Sign-on User Authentication Scheme Using

Mobile Token Without Verifier Table for Cloud Based Services

CH 15 Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers

CH 16 Secure Elliptic Curves in Cryptography

CH 17 Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis

Part IV Biometrics and Forensics

CH 18 Biometric Systems for User Authentication

CH 19 Biometric Authentication and Data Security in Cloud Computing

CH 20 Approximate Search in Digital Forensics

CH 21 Privacy Preserving Internet Browsers: Forensic Analysis of Browzar

Part V Hardware Security

CH 22 Experimental Digital Forensics of Subscriber Identification Module (SIM) Card

CH 23 A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks

CH 24 Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs

Part VI Security Applications

CH 25 Generic Semantics Specification and Processing for Inter-System Information Flow Tracking

CH 26 On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns

CH27 Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment

Part VII Security Management

CH 28 Securing the Internet of Things: Best Practices for Deploying IoT Devices

CH 29 Cognitive Computing and Multiscale Analysis for Cyber Security

CH 30 A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems

CH 31 Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts

CH 32 A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems

CH 33 Accountability for Federated Clouds

CH 34 A Cognitive and Concurrent Cyber Kill Chain Model

CH 35 Defense Methods Against Social Engineering Attacks

مشخصات:

نویسنده: Kevin Daimi

ناشر:Springer

سال نشر:2018

تعداد صفحات:608

حجم:8.4 MB

 

به دوستانتان هم بگویید...

Submit to FacebookSubmit to Google PlusSubmit to TwitterSubmit to LinkedIn

عضویت در خبرنامه

کانال تلگرام و اینستاگرام هیوا شبکه

telegram Hivashabakeinstagram hiva.network

تجهیزات شبکه


Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/modules/mod_AutsonSlideShow/tmpl/default.php on line 17

Strict Standards: Only variables should be assigned by reference in /home/hivanet1/public_html/modules/mod_AutsonSlideShow/tmpl/default.php on line 42

هر جای ایران که هستید...
ما پشتیبان و مشاور شما هستیم...

 

سامانه مشاوره و پشتیبانی

سازمان ها و ادارات ...

کارخانه ها و شرکت ها ...

 

تا راه اندازی و نگهداری از

سرویس های شبکه شما ...

با ما در تماس باشید ...

 

تلفن: 33241269-13

تلفن: 33260041-13

ایمیل: info@hiva-network.com

محصول ویژه برای شما

در جستجوی محصول آموزشی خاصی هستید اما هرچه جستجو می کنید آن را نمی یابید ؟

به ما بگویید...