Handbook of Computer Networks and Cyber Security: Principles and Paradigms

1. Security Frameworks in Mobile Cloud Computing.- 2. An investigation study of Privacy Preserving in Cloud.- 3....
$664.76 SGD
$664.76 SGD
SKU: 9783030222796
Product Type: Books
Please hurry! Only 360 left in stock
Author: Brij B. Gupta
Format: Paperback
Language: English
Subtotal: $664.76
10 customers are viewing this product
Handbook of Computer Networks and Cyber Security: Principles and Paradigms by Gupta, Brij B.

Handbook of Computer Networks and Cyber Security: Principles and Paradigms

$664.76

Handbook of Computer Networks and Cyber Security: Principles and Paradigms

$664.76
Author: Brij B. Gupta
Format: Paperback
Language: English
1. Security Frameworks in Mobile Cloud Computing.- 2. An investigation study of Privacy Preserving in Cloud.- 3. Towards new quantitative security risk analysis models for information systems: A Cloud Computing case study.- 4. A Novel AckIBE based Secure Cloud Data Management Framework.- 5. A Practicable Machine Learning Solution for Security-cognizant Data Placement on Cloud Platforms.- 6. Threats behind default configurations of network devices: local network attacks and their countermeasures.- 7. Security and Privacy issues in Wireless Sensor and Body Area Networks.- 8. Preventing Security and Privacy Attacks in WBANs.- 9. Security in Underwater Wireless Sensor Networks.- 10. Security Issues in Cognitive Radio Ad Hoc Networks.- 11. Security and privacy in social networks: Data and Structural Anonymity.- 12. SOI FinFET for Computer Networks and Cyber Security Systems.- 13. Software Defined Networking: An Innovative Approach to Computer Networks.- 14. Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.- 15. Survey on DDoS Attacks Techniques and Solutions in Software Defined Network.- 16. Classification of Cooperative Distributed Denial of Service Defense (DDoS) Schemes.- 17. Epidemic Modelling for the Spread of Bots through DDoS Attack in E-Commerce Network.- 18. Physical unclonable functions (puf) based security in iot: key challenges and solutions.- 19. Fog Computing: Applications and Secure Data Aggregation.- 20. A Comprehensive review of Distributed Denial of service (DDoS) Attacks in Fog Computing Environment.- 21. Secure Machine Learning scenario from Big Data in Cloud Computing via Internet of Things network.- 22. Heterogeneous-Internet of Vehicles (IoV) Communication in 21st Century: A comprehensive study.- 23. A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems.- 24. Investigation of Security Issues in Distributed Systems Monitoring.- 25. An analysis of Provable Security Frameworks for RFID Security.- 26. Computational Techniques for Real Time Credit Card Fraud Detection.- 27. Requirements, Protocols and Security Challenges in Wireless Sensor Networks - An Industrial Perspective.- 28. Privacy Preservation of Electronic Health Record: Current Status and Future Direction.- 29. QKD protocols security between theory and engineering implementation.- 30. Survey of Security and Privacy issues on Biometric system.- 31. A Novel Session key Generation and Secure Communication Establishment Protocol Using Fingerprint Biometrics.- 32. Trees, CryptoSignatures and Cyberspace Mobile Agent Interfaces.- 33. Permutation-Substitution Based Image Encryption Algorithms using Pseudo Random Number Generators.- 34. Recent Trends in Document Authentication using Text Steganography.- 35. Machine Learning Based Intrusion Detection Techniques.- 36. Feature Selection using a Machine Learning to Classify a Malware.- 37. DeepDGA-MINet: Cost-Sensitive Deep Learning based Framework for Handling Multiclass Imbalanced DGA Detection.- 38. ABFT: Analytics to uplift Big Social Events Using Forensic Tools.- 39. HackIt: A Real-Time Simulation Tool for Studying Real-World Cyber-Attacks in the Laboratory.

Author: Brij B. Gupta
Publisher: Springer
Published: 08/26/2021
Pages: 959
Binding Type: Paperback
Weight: 2.96lbs
Size: 9.21h x 6.14w x 1.93d
ISBN: 9783030222796

About the Author
Brij B. Gupta received his PhD degree from the Indian Institute of Technology Roorkee, India in the area of Information and Cyber Security. In 2009, he was selected for the Canadian Commonwealth Scholarship award by the Government of Canada. He has published more than 150 research papers (including 04 books and 18 book chapters) in International Journals and Conferences of high repute including IEEE, Elsevier, ACM, Springer, Wiley, Taylor & Francis, Inderscience, etc. He has visited several countries, i.e. Canada, Japan, Australia, China, Spain, Hong-Kong, Italy, Malaysia, Macau, etc. to present his research work. His biography was selected and published in the 30th Edition of Marquis Who's Who in the World, 2012. In addition, he has been selected in 2017 to receive the Albert Nelson Marquis Lifetime Achievement Award' by Marquis Who's Who in the World, USA. He also received the Sir Visvesvaraya Young Faculty Research Fellowship Award in 2017 from the Ministry of Electronics and Information Technology, Government of India. Recently, he has been awarded with '2018 Best Faculty Award for research activities' and '2018 Best Faculty Award for Project and Laboratory Development' from the National Institute of Technology Kurukshetra, India.

Gregorio Martínez Pérez received a Ph.D. degree in Computer Science at the University of Murcia (Spain). In 1997 he started working in Computer Service of the same University on various projects on end-user products related to security and networking, and in 2014 he was appointed as Full Professor in the same department. His scientific activity is mainly devoted to cybersecurity, privacy and 5G networking, including security considerations, management models, network slicing and communication architectures. He is also working on the design and autonomic monitoring of real-time and critical applications and systems. He is working on different national (14 in the last decade) and European IST research projects (11 in the last decade) related to these topics, being Principal Investigator in most of them. He has published more than 160 papers in national and international conference proceedings, magazines and journals. He has been guest editing more than 30 special issues in different journals and magazines in the last few years. He is member of the editorial board of 16 journals, most of them related to the topics being covered in this handbook. He has already supervised 10 PhD students, several of them recognized with honors. He is currently the Deputy Director for Knowledge Transfer of the University of Murcia.
Dharma P. Agrawal is the Ohio Board of Regents Distinguished Professor and the founding director for the Center for Distributed and Mobile Computing in the Department of Electrical Engineering and Computing Systems. He has been a faculty member at the ECE Dept., Carnegie Mellon University (on sabbatical leave), N.C. State University, Raleigh and the Wayne State University. His current research interests include applications of sensor networks in monitoring Parkinson's disease patients and neurosis, applications of sensor networks in monitoring fitness of athletes' personnel wellness, applications of sensor networks in monitoring firefighters physical condition in action, efficient secured communication in Sensor networks, secured group communication in Vehicular Networks, use of Femto cells in LTE technology and interference issues, heterogeneous wireless networks, and resource allocation and security in mesh networks for 4G technology. He has been the Program Chair and General Chair for numerous international conferences and meetings.He has been named as an ISI Highly Cited Researcher, is a Fellow of the IEEE, the ACM, the AAAS and the World Innovation Foundation, and a recent recipient of 2008 IEEE CS Harry Goode Award.
Deepak Gupta received his Master of Science degree from Illinois Institute of Technology, Chicago, USA, in the area of Computer Forensics and Cyber Security with a specialization in Voice Over Internet Protocol (VOIP). As an undergraduate student, he became certified on the major networking platforms, first as a CCNA (Cisco Certified Network Administrator) and then as a MCP (Microsoft Certified Professional) which would come to serve him well in his professional life. As a graduate student, Deepak continued to challenge himself by working on a number of research papers and projects related to Computer Network Security and Forensics Research, including the topics of multi-boot computer systems with change of boot loader and MP3 steganography. He also developed and furthered his interest in VOIP technology by working on and leading research projects with Bell Labs, a prominent VOIP research lab based in Chicago. Deepak also wrote research papers in this field on the topics of P2P communication and SIP protocols which won him the best student VOIP project award in 2007.

Returns Policy

You may return most new, unopened items within 30 days of delivery for a full refund. We'll also pay the return shipping costs if the return is a result of our error (you received an incorrect or defective item, etc.).

You should expect to receive your refund within four weeks of giving your package to the return shipper, however, in many cases you will receive a refund more quickly. This time period includes the transit time for us to receive your return from the shipper (5 to 10 business days), the time it takes us to process your return once we receive it (3 to 5 business days), and the time it takes your bank to process our refund request (5 to 10 business days).

If you need to return an item, simply login to your account, view the order using the "Complete Orders" link under the My Account menu and click the Return Item(s) button. We'll notify you via e-mail of your refund once we've received and processed the returned item.

Shipping

We can ship to virtually any address in the world. Note that there are restrictions on some products, and some products cannot be shipped to international destinations.

When you place an order, we will estimate shipping and delivery dates for you based on the availability of your items and the shipping options you choose. Depending on the shipping provider you choose, shipping date estimates may appear on the shipping quotes page.

Please also note that the shipping rates for many items we sell are weight-based. The weight of any such item can be found on its detail page. To reflect the policies of the shipping companies we use, all weights will be rounded up to the next full pound.

Related Products

Recently Viewed Products