Vi bøger
Levering: 1 - 2 hverdage

Bøger i Advances in Information Security serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • af John Aycock
    1.221,95 - 1.372,95 kr.

    It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware is designed for a professional audience composed of researchers and practitioners in industry.

  • af Song Y. Yan
    1.554,95 - 1.595,95 kr.

    Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography.

  • af Aggelos Kiayias & Serdar Pehlivanoglu
    1.087,95 - 1.365,95 kr.

    This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.

  • - Enabled Information Small-Medium Enterprises (TEISMES)
    af Charles A. Shoniregun
    1.028,95 - 1.365,95 kr.

    Details the key impacts and risk assessment within the context of technology-enabled information (TEI). This volume is designed as a secondary text for graduate students, and also for a professional audience of researchers and practitioners in industry.

  • af Kim-Kwang Raymond Choo
    1.221,95 kr.

    Secure Key Establishment discusses the problems encountered in this field. It also introduces several improved protocols with new proofs of security and covers several variants of the widely accepted Bellare and Rogaway model.

  • af Charles A. Shoniregun, Kudakwashe Dube & Fredrick Mtenzi
    1.125,95 - 1.171,95 kr.

    The rise of various demands in healthcare is driving innovation in healthcare information management. This book is the first comprehensive exploration into the challenges of e-healthcare information and security policy technologies.

  • af Dimitris A. Gritzalis
    880,95 - 1.332,95 kr.

    Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems.

  • af José A. Onieva, Javier Lopez & Jianying Zhou
    1.028,95 - 1.365,95 kr.

    The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation.

  • af Charles A. Shoniregun
    1.332,95 - 1.365,95 kr.

    This volume identifies the security problems facing internet communication protocols along with the risks associated with internet connections. It includes a number of different algorithms and protocols to provide a cohesive security framework.

  • - Concepts and Techniques
    af Ali A. Ghorbani, Wei Lu & Mahbod Tavallaee
    1.007,95 - 1.688,95 kr.

    This is a comprehensive text on intrusion detection. It offers reviews of the fundamentals in the field and covers all the latest developments. Too, it provides case studies at the end of each chapter.

  •  
    1.540,95 kr.

    Chapter 1- Blockchain in Cybersecurity Realm: An Overview.- Chapter 2- Capability-based Non-Fungible Tokens Approach for a Decentralized AAA Framework in IoT.- Chapter 3 - IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain.- Chapter 4 - Scrybe: A 2nd-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications.- Chapter 5 - Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus.- Chapter 6 - Secure blockchain-based traffic load balancing using edge computing and reinforcement learning.- Chapter 7- Blockchain Applications in Power Systems: A Bibliometric Analysis.- Chapter 8 - A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence.- Chapter 9 - The Future of Blockchain Technology in Healthcare Internet of Things Security.- Chapter 10 - Secure Healthcare Framework using Blockchain and Public Key Cryptography.- Chapter 11 - Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.- Chapter 12 - Immutable and Secure IP Address Protection using Blockchain.- Chapter 13- On the Application of Financial Security Standards in Blockchain Platforms.- Chapter 14 - Blockchain-based Certification for Education, Employment, and Skill with Incentive Mechanism.

  •  
    1.307,95 kr.

    This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions - this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

  •  
    838,95 kr.

    This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas.

  •  
    1.027,95 kr.

    This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.

  •  
    839,95 kr.

    This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades.

  •  
    838,95 kr.

    It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission.

  •  
    1.440,95 kr.

    Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap. This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide, which address important attacks from theoretical (modeling) as well as practical aspects. Each chapter brings together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks. This book will serve the interests of cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field.

  •  
    1.207,95 kr.

    This book discusses and summarizes current research issues, identifies challenges, and outlines future directions for proactive and dynamic network defense.

  • af Shui Yu, Wanlei Zhou, Yang Xiang, mfl.
    1.258,95 kr.

    This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

  •  
    880,95 kr.

    This book is centered on Smart grids and micro-grids, as a cost-effective method of ensuring fair and equitable access to power in urban areas.

  •  
    1.307,95 kr.

    This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes.The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost real-time, and with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ¿ this in essence defines cyber threat intelligence notion. However, such intelligence would not be possible without the aid of artificial intelligence, machine learning and advanced data mining techniques to collect, analyze, and interpret cyber-attack campaigns which is covered in this book. This book will focus on cutting-edge research from both academia and industry, with a particular emphasis on providing wider knowledge of the field, novelty of approaches, combination of tools and so forth to perceive reason, learn and act on a wide range of data collected from different cyber security and forensics solutions. This book introduces the notion of cyber threat intelligence and analytics and presents different attempts in utilizing machine learning and data mining techniques to create threat feeds for a range of consumers. Moreover, this book sheds light on existing and emerging trends in the field which could pave the way for future works. The inter-disciplinary nature of this book, makes it suitable for a wide range of audiences with backgrounds in artificial intelligence, cyber security, forensics, big data and data mining, distributed systems and computer networks. This would include industry professionals, advanced-level students and researchers that work within these related fields.

  • - Creating Asymmetric Uncertainty for Cyber Threats
     
    1.104,95 kr.

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers.

  • - Building the Scientific Foundation
     
    1.048,95 kr.

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  •  
    1.013,95 kr.

    This book explores cybersecurity research and development efforts, including ideas that deal with the growing challenge of how computing engineering can merge with neuroscience.

  •  
    1.573,95 kr.

    This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.

  • - Building the Scientific Foundation
     
    1.136,95 kr.

    This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors.

  •  
    1.392,95 kr.

    This book explores the future of cyber technologies and cyber operations which will influence advances in social media, cyber security, cyber physical systems, ethics, law, media, economics, infrastructure, military operations and other elements of societal interaction in the upcoming decades.

  •  
    412,95 kr.

    Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

  •  
    1.443,95 kr.

    Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY.

  • - An Abstraction-Based Approach
    af Sushil Jajodia, Peng Ning & Xiaoyang Sean Wang
    520,95 kr.

    Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.