Vi bøger
Levering: 1 - 2 hverdage

Bøger af Lingyu Wang

Filter
Filter
Sorter efterSorter Populære
  • af Lingyu Wang
    1.387,95 kr.

    Digital forensics deals with the investigation of cybercrimes. With the growing deployment of cloud computing, mobile computing, and digital banking on the internet, the nature of digital forensics has evolved in recent years, and will continue to do so in the near future.This book presents state-of-the-art techniques to address imminent challenges in digital forensics. In particular, it focuses on cloud forensics, Internet-of-Things (IoT) forensics, and network forensics, elaborating on innovative techniques, including algorithms, implementation details and performance analysis, to demonstrate their practicality and efficacy. The innovations presented in this volume are designed to help various stakeholders with the state-of-the-art digital forensics techniques to understand the real world problems. Lastly, the book will answer the following questions: How do the innovations in digital forensics evolve with the emerging technologies? What are the newest challenges in the field of digital forensics?

  • af Lingyu Wang, Sushil Jajodia & Duminda Wijesekera
    1.648,95 kr.

  • af Lingyu Wang, Massimiliano Albanese & Sushil Jajodia
    550,95 kr.

  • af Lingyu Wang, Sushil Jajodia, Yves Deswarte & mfl.
    1.097,95 kr.

  • af Lingyu Wang, Sushil Jajodia, Yves Deswarte & mfl.
    592,95 kr.

  • af Lingyu Wang
    1.093,95 kr.

    On-Line Analytic Processing (OLAP) systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. Existing inference control methods in statistical databases usually exhibit high performance overhead and limited effectiveness when applied to OLAP systems.Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style OLAP queries regarding sensitive data while provably preventing adversaries from inferring the data. How to keep the performance overhead of these security methods at a reasonable level is also addressed. Achieving a balance between security, availability, and performance is shown to be feasible in OLAP systems.Preserving Privacy in On-Line Analytical Processing is designed for the professional market, composed of practitioners and researchers in industry.  This book is also appropriate for graduate-level students in computer science and engineering.

  • - Application to Malicious Code Fingerprinting
    af Lingyu Wang, Djedjiga Mouheb, Mourad Debbabi, mfl.
    1.666,95 - 1.673,95 kr.

    This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.

  • af Lingyu Wang, Mourad Debbabi, Makan Pourzandi, mfl.
    998,95 - 1.285,95 kr.

    This book provides a comprehensive review of the most up to date research related to cloud security auditing and discusses auditing the cloud infrastructure from the structural point of view, while focusing on virtualization-related security properties and consistency between multiple control layers.

  • af Lingyu Wang, Sushil Jajodia & Anoop Singhal
    998,95 - 1.618,95 kr.

  • - From Data Publishing to Web Applications
    af Lingyu Wang & Wen Ming Liu
    1.209,95 - 1.275,95 kr.

    This book offers a novel approach to data privacy by unifying side-channel attacks within a general conceptual framework. Next, the book explores privacy-preserving traffic padding in Web applications, first via a model to quantify privacy and cost and then by introducing randomness to provide background knowledge-resistant privacy guarantee.

  • af Lingyu Wang, Djedjiga Mouheb, Mourad Debbabi, mfl.
    767,95 - 874,95 kr.

    In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models.The work is organized as follows: chapter 1 presents an introduction to software security, model-driven engineering, UML and aspect-oriented technologies.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.