Computer and Network Security Essentials
16 خرداد 1397 کتاب های هک و امنیت بدون دیدگاه

 Computer and Network Security Essentials

امنیت کامپیوتر می تواند به عنوان مجموعه ای از مکانیسم هایی که از سیستم های کامپیوتری در مقابل دسترسی های غیرمجاز، سرقت، آسیب و اختلال در خدمات محافظت می کند، در نظر گرفته شود. این شامل حفاظت از تهدیدات داخلی و خارجی می شود. تهدید داخلی می تواند در یک برنامه نرم افزاری یا سیستم عامل جریان یابد. تهدیدات خارجی شامل دسترسی غیرمجاز یا خطای انسانی می شود. کتاب Computer and Network Security Essentials خوانندگان را با ابزارهای مورد نیاز برای حفاظت از منابع IT آشنا می کند و طیف گسترده ای از موضوعات امنیتی از جمله فناوری های رمزنگاری، امنیت شبکه، مدیریت امنیت، تضمین اطلاعات، برنامه های امنیتی، امنیت کامپیوتر، امنیت سخت افزار و بیومتریک را در بر می گیرد.

سرفصل ها:

Part I Computer Security

CH 1 Computer Security

CH 2 A Survey and Taxonomy of Classifiers of Intrusion DetectionSystems

CH 3 A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State VelocityMachine and Vector Mathematics

CH 4 Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining

CH 5 A Postmortem Forensic Analysis for a JavaScript Based Attack

Part II Network Security

CH 6 Malleable Cryptosystems and Their Applications in WirelessSensor Networks

CH 7 A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems

CH 8 Security Protocols for Networks and Internet: A Global Vision in Digital Forensics

CH 9 Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls

CH 10 Reliable Transmission Protocol for Underwater Acoustic Networks.

CH 11 Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield

Part III Cryptographic Technologies

CH 12 Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study

CH 13 Searching Encrypted Data on the Cloud

CH 14 A Strong Single Sign-on User Authentication Scheme Using

Mobile Token Without Verifier Table for Cloud Based Services

CH 15 Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers

CH 16 Secure Elliptic Curves in Cryptography

CH 17 Mathematical Models for Malware Propagation in Wireless Sensor Networks: An Analysis

Part IV Biometrics and Forensics

CH 18 Biometric Systems for User Authentication

CH 19 Biometric Authentication and Data Security in Cloud Computing

CH 20 Approximate Search in Digital Forensics

CH 21 Privacy Preserving Internet Browsers: Forensic Analysis of Browzar

Part V Hardware Security

CH 22 Experimental Digital Forensics of Subscriber Identification Module (SIM) Card

CH 23 A Dynamic Area-Efficient Technique to Enhance ROPUFs Security Against Modeling Attacks

CH 24 Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs

Part VI Security Applications

CH 25 Generic Semantics Specification and Processing for Inter-System Information Flow Tracking

CH 26 On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns

CH27 Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment

Part VII Security Management

CH 28 Securing the Internet of Things: Best Practices for Deploying IoT Devices

CH 29 Cognitive Computing and Multiscale Analysis for Cyber Security

CH 30 A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems

CH 31 Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts

CH 32 A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems

CH 33 Accountability for Federated Clouds

CH 34 A Cognitive and Concurrent Cyber Kill Chain Model

CH 35 Defense Methods Against Social Engineering Attacks

مشخصات:

نویسنده: Kevin Daimi

ناشر: Springer

سال نشر: 2018

تعداد صفحات: 608

حجم: 8.4 MB