Fr. 76.00

Security Analytics - A Data Centric Approach to Information Security

Inglese · Tascabile

Spedizione di solito entro 3 a 5 settimane

Descrizione

Ulteriori informazioni










This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.


Sommario










1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft-max-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier-Penalty Function for developing privacy mechanism in cyber physical system.


Info autore










Dr. Mehak Khurana is a Certified Ethical Hacker (CEH) and has more than 11 years of experience in teaching and research. She is currently working as an Assistant Professor at The NorthCap University, Gurugram. Prior to that, she has worked at HMRITM, GGSIPU. She earned a Ph.D. degree in the field of Information Security and Cryptography. She completed her M. Tech degree with a silver medal in Information Technology from USICT, GGSIPU, Delhi. To better align the department with the industry's best practices, she introduced and designed courses on Penetration Testing, Secure Coding and Software Vulnerabilities, Web and Mobile Security. She also organized International Conference on Cyber Security and Digital Forensics in 2021 in collaboration with Springer as a Convener. Her specialization is cybersecurity, information security, and cryptography. She has published many papers in various reputed National/International Journals and conferences. She has been a mentor to various B. Tech and M. Tech projects. She has been a resource person in various FDPs, workshops, guest lectures, and chaired the session at various Conferences. She is editing books from the various publishers like Springer, CRC Press, etc. She is serving as a reviewer for many reputed Journals and TPC member for various International Conferences.
She has also been involved in activities to improve the standard of the profession. For that, she has coordinated many events in collaboration with IIT Bombay, IIT Madras, and IIIT Delhi. She successfully organized TEDx 2017 and 2019 as a co-curator. She is leading a few chapters and societies in her current university, Institute of Engineers India (IEI) CSE chapter, Programmers Club, Alumni Sub-committee, and Open Web Application Software Project at the North Cap University, and many more.
She is an active member of various global societies, such as the Open Web Application Software Project (OWASP), Optical Society of America (OSA), Women in Appsec (WIA), Cryptology Research Society of India (CRSI).
Dr. Shilpa Mahajan has more than 14 years of teaching experience at postgraduate and undergraduate levels. She is a committed researcher in the field of sensor networks and has done her Ph.D. in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She completed her post-graduation with distinction from Punjab Engineering College, Chandigarh. She specializes in Cyber Security, Computer Networks, Data Structures, Operating Systems, and Mobile Computing. She has introduced and designed various courses like Network Security and Cyber Security. Presently two doctoral scholars are pursuing their Ph.D. under his supervision. She has guided various M. Tech and B. Tech Projects. She has published many research papers in peer-reviewed reputed international journals and conferences. She has been a resource person in various FDPs, workshops, guest lectures, and seminars.
She is a CCNA certified instructor and has also done certifications in Data Scientist Tools, Exploratory Data Analysis, and Getting and Cleaning Data from Johns Hopkins University. She is a Lifetime member of ISTE. She is a CISCO-certified training instructor for CCNA modules 1, 2, 3, and 4. She has been appointed Advanced Level Instructor this year. She received an appreciation from Cisco Networking Academy for 5 years' active participation. She also set up a CISCO Networking Academy and developed a CISCO lab at NCU, Gurgaon in January 2014.


Riassunto

This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.

Dettagli sul prodotto

Con la collaborazione di Mehak Khurana (Editore), Shilpa Mahajan (Editore)
Editore Taylor and Francis
 
Lingue Inglese
Formato Tascabile
Pubblicazione 07.10.2024
 
EAN 9781032265261
ISBN 978-1-032-26526-1
Pagine 224
Peso 440 g
Illustrazioni schwarz-weiss Illustrationen, Raster,schwarz-weiss, Zeichnungen, schwarz-weiss, Tabellen, schwarz-weiss
Serie Chapman & Hall/CRC Cyber-Physical Systems
Categorie Scienze sociali, diritto, economia > Sociologia > Teorie sociologiche

COMPUTERS / Computer Science, TECHNOLOGY & ENGINEERING / Electronics / General, COMPUTERS / Security / General, computer science, Privacy & data protection, Privacy and data protection, Network Security, Electronics engineering, COMPUTERS / Security / Network Security

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.