feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Springer.
    UID:
    almafu_BV047831914
    Format: 1 Online-Ressource (X, 281 p. 1 illus).
    Edition: 1st ed. 2021
    ISBN: 978-3-030-82079-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82078-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82080-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82081-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham : Springer International Publishing | Cham : Springer
    UID:
    b3kat_BV047421030
    Format: 1 Online-Ressource (XXVI, 234 p. 110 illus., 91 illus. in color)
    Edition: 1st ed. 2021
    ISBN: 9783030691745
    Series Statement: EAI/Springer Innovations in Communication and Computing
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-69173-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-69175-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-69176-9
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hershey PA, USA : IGI Global
    UID:
    b3kat_BV049327257
    Format: 1 Online-Ressource (xx, 445 Seiten)
    ISBN: 9781668482209
    Content: Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis.Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the penetration test's succeeding stages. This procedure enables readers to observe how the research instruments and phases interact. This book provides a high level of understanding of the emerging technologies in penetration testing, cyber-attacks, and ethical hacking and offers the potential of acquiring and processing a tremendous amount of data from the physical world. Covering topics such as cybercrimes, digital forensics, and wireless hacking, this premier reference source is an excellent resource for cybersecurity professionals, IT managers, students and educators of higher education, librarians, researchers, and academicians.
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781668482186
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1668482185
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Social Engineering
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Springer.
    UID:
    edoccha_BV047831914
    Format: 1 Online-Ressource (X, 281 p. 1 illus).
    Edition: 1st ed. 2021
    ISBN: 978-3-030-82079-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82078-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82080-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82081-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing, | Cham :Springer.
    UID:
    edocfu_BV047831914
    Format: 1 Online-Ressource (X, 281 p. 1 illus).
    Edition: 1st ed. 2021
    ISBN: 978-3-030-82079-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82078-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82080-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-82081-7
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Bentham Science Publishers Pte. Ltd.,
    UID:
    almafu_9961673616702883
    Format: 1 online resource (184 pages)
    Edition: First edition.
    ISBN: 981-5136-11-9
    Content: Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks. New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era. These topics include: · Ransomware and DDoS attacks · Security algorithms · Design and implementation solutions for resilient and fault-tolerant cloud and network services · Security policy · End user data security The book is an essential resource for anyone involved in cloud computing and network security, including learners, professionals and enthusiasts.
    Additional Edition: ISBN 9789815136128
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949434623002882
    Format: 1 online resource (x, 288 pages) : , illustrations.
    Edition: First edition.
    ISBN: 9781003283003 , 1003283004 , 9781000820072 , 1000820076 , 9781000820133 , 1000820130
    Series Statement: Advances in cybersecurity management
    Content: "The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues and solutions for forensic science. Such systems are becoming increasingly common in public locations, businesses, universities, residences, and other shared offices, producing enormous amounts of data at rapid speeds in a variety of forms. IoT devices can be used as suspects, digital witnesses, or instruments of crime and cyberattacks, posing new investigation problems, forensic issues, security threats, legal concerns, privacy concerns, and ethical dilemmas. A cyberattack on IoT devices might target the device itself or associated systems, particularly vital infrastructure. This book discusses the advancements in IoT and Cyber-Physical Systems (CPS) Forensics. The first objective is to learn and understand the fundamentals of the Internet of Things Forensics. This objective will answer the question of why and how the IoT has evolved itself as one of the most promising and widely accepted technology across the globe and has widely accepted applications. The second objective is to learn how to use the CPS to answer many computational problems. CPS Forensics is a promising domain and various advancements are there in this field. This book is structured in such a way so that the field of study is relevant to each reader's major or interests. The book's goal is to help each reader to see the relevance of IoT and CPS Forensics to his or her career or interests. This book not only presents numerous case stories from a global perspective, but it also compiles a large amount of literature and research from a database. As a result, this book effectively demonstrates the concerns, difficulties, and trends surrounding the topic while also encouraging readers to think globally. The main goal of this project is to encourage both researchers and practitioners to share and exchange their experiences and recent studies between academia and industry"--
    Additional Edition: Print version: Internet of things and cyber physical systems Boca Raton : CRC Press, 2023 ISBN 9781032254067
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9949598833502882
    Format: 1 online resource
    Edition: First edition.
    ISBN: 9781003269168 , 1003269168 , 9781000934045 , 1000934047 , 9781000934014 , 1000934012
    Content: "Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access or manipulation of devices and systems. This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel architectures in artificial intelligence, machine learning and data science in the field of healthcare and IoT. The IoMT includes a wide range of connected medical devices and systems, such as wearable devices, medical sensors, and electronic health records, that collect, store, and share sensitive medical information. Without proper security measures, this information could be compromised, leading to serious privacy breaches, financial fraud, and even physical harm to patients"--
    Note: IoT- An Emerging Boon in Today's Healthcare Industry / Sameeka Saini -- Secure Blockchain based Intelligent-Internet of Things / Sima Das, Nimay Chandra Giri, Kaushik Mazumdar, Parijat Bhowmick, Himanshu Tiwari, Divya Pant and Shilpa Mehta -- An Intellectual Analysis of Structural Health Care System in India Using Intelligent Based Techniques / Nafees Akhter Farooqui, Ritika Mehra and Samrah Butool Faridi -- A Secure Medical-IoT device for assisting the visually impaired in external navigation using a portable braille pad / Divyansh Khandelwal, Rishiraj Singh Chhabra and Sumit Kumar Jindal -- Cybersecurity in Medical Internet of Things- Issues, challenges and Future Directions / Rachana Y. Patil, Yogesh H. Patil and Aparna Bannore -- Security and privacy aspect of AI, IoT in Healthcare Industry / R. Malthiyar and K. Jhajharia -- Security and Privacy Concerns in Smart Healthcare / Sumit Kumar and Dr. Prachi -- Fusion of Information theoretical models with personalized differential privacy to Minimize of Privacy Loss in Healthcare Cyber Physical Systems / Manas Kumar Yogi and Dr. A. S. N. Chakravarthy.
    Additional Edition: Print version: Security implementation in internet of medical things Boca Raton : CRC Press, 2024 ISBN 9781032216034
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949385574802882
    Format: 1 online resource (xvi, 248 pages)
    Edition: First edition.
    ISBN: 9781003140023 , 1003140025 , 9781000520613 , 1000520617 , 9781000520590 , 1000520595
    Content: This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first objective is to learn and understand the need for and impact of advanced cybersecurity and forensics and its implementation with multiple smart computational technologies. This objective answers why and how cybersecurity and forensics have evolved as one of the most promising and widely-accepted technologies globally and has widely-accepted applications. The second objective is to learn how to use advanced cybersecurity and forensics practices to answer many computational problems where confidentiality, integrity, and availability are essential aspects to handle and answer. This book is structured in such a way so that the field of study is relevant to each reader's major or interests. It aims to help each reader see the relevance of cybersecurity and forensics to their career or interests. This book intends to encourage researchers to develop novel theories to enrich their scholarly knowledge to achieve sustainable development and foster sustainability. Readers will gain valuable knowledge and insights about smart computing technologies using this exciting book. This book: " Includes detailed applications of cybersecurity and forensics for real-life problems " Addresses the challenges and solutions related to implementing cybersecurity in multiple domains of smart computational technologies " Includes the latest trends and areas of research in cybersecurity and forensics " Offers both quantitative and qualitative assessments of the topics Includes case studies that will be helpful for the researchers Prof. Keshav Kaushik is Assistant Professor in the Department of Systemics, School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. Dr. Shubham Tayal is Assistant Professor at SR University, Warangal. Dr. Akashdeep Bhardwaj is Professor (Cyber Security & Digital Forensics) at the University of Petroleum & Energy Studies (UPES), Dehradun, India. Dr. Manoj Kumar is Assistant Professor (SG) (SoCS) at the University of Petroleum and Energy Studies, Dehradun
    Note: 1. Detection of Cross-Site Scripting and Phishing Website Vulnerabilities Using Machine Learning.J. Charu, S. Sunil, and C. Aarti2. A Review: Security and Privacy Defensive Techniques for Cyber Security Using Deep Neural Networks (DNNs).Prachi Chauhan, Hardwari Lal Mandoria, andAlok Negi3. DNA-Based Cryptosystem for Connected Objects and IoT Security.Brahim Belhorma, Mounir Bouhedda, Billel Bengherbia, and Omar Benzineb4. A Role of Digital Evidence: Mobile Forensics Data.G. Maria Jones, S. Godfrey Winster, and L. Ancy Geoferla5. Analysis of Kernel Vulnerabilities Using Machine Learning. Supriya Raheja, Rakesh Garg, andBhavya Gururani6. Cyber Threat Exploitation and Growth during COVID-19 Times.Romil Rawat, Bhagwati Garg, Vinod Mahor, Mukesh Chouhan, Kiran Pachlasiya, and Shrikant Telang7. An Overview of the Cybersecurity in Smart Cities in the Modern Digital Age.Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano8. The Fundamentals and Potential for Cyber Security of Machine Learning in the Modern World. Ana Carolina Borges Monteiro, Reinaldo Padilha França, Rangel Arthur, and Yuzo Iano9. Qualitative and Quantitative Evaluation of Encryption Algorithms.Rakesh Garg, Supriya Raheja, and Durgesh Pandey10. Analysis and Investigation of Advanced Malware Forensics.P. S. Apirajitha, S. Punitha, and Stephan Thompson11. Network Intrusion Detection System Using Naïve Bayes Classification Technique for Anomaly Detection.Sam Goundar,Manveer Singh,Rahul Chand, andAkashdeep Bhardwaj12. Data Security Analysis in Mobile Cloud Computing for Cyber Security.Sam Goundar andAkashdeep Bhardwaj13. AComprehensive Review of Investigations of Suspects of Cyber Crimes. Joshua Nehinbe Ojo14. Fault Analysis Techniques in Lightweight Ciphers for IoT Devices.Priyanka Joshi andBodhisatwa Mazumdar
    Additional Edition: Print version : ISBN 9780367686505
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Sharjah :Bentham Science Publishers,
    UID:
    almahu_9949767414802882
    Format: 1 online resource (184 pages)
    Edition: 1st ed.
    ISBN: 9789815136111
    Content: Increasingly global and online social interactions and financial transactions involve digital data, computing devices and the internet. With cloud computing, remote computing, enterprise mobility and e-commerce on the rise, network security has become a priority. Selecting an appropriate algorithm and policy is a challenge for computer security engineers, as new technologies provide malicious users with opportunities to intrude into computer networks. New Age Cyber Threat Mitigation for Cloud Computing Networks provides cloud and network engineers answers to cybersecurity challenges. It highlights new options, methodologies and feasible solutions that can be implemented in cloud architecture and IT Infrastructure, thereby securing end users. Chapters cover many topics related to cyber threats in the modern era. These topics include: · Ransomware and DDoS attacks · Security algorithms · Design and implementation solutions for resilient and fault-tolerant cloud and network services · Security policy · End user data security The book is an essential resource for anyone involved in cloud computing and network security, including learners, professionals and enthusiasts.
    Additional Edition: Print version: Bhardwaj, Akashdeep New Age Cyber Threat Mitigation for Cloud Computing Networks Sharjah : Bentham Science Publishers,c2023 ISBN 9789815136128
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages