Safe Computing for Emerging Economies:
This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated....
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Newcastle-upon-Tyne
Cambridge Scholars Publisher
2018
|
Schlagworte: | |
Online-Zugang: | HWR01 |
Zusammenfassung: | This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (201 Seiten) |
ISBN: | 9781527525948 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047697789 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220120s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781527525948 |9 978-1-5275-2594-8 | ||
035 | |a (ZDB-30-PQE)EBC5639187 | ||
035 | |a (ZDB-30-PAD)EBC5639187 | ||
035 | |a (ZDB-89-EBL)EBL5639187 | ||
035 | |a (ZDB-38-EBR)ebr11648471 | ||
035 | |a (OCoLC)1083097009 | ||
035 | |a (DE-599)BVBBV047697789 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Anyanwu, Longy O. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Safe Computing for Emerging Economies |
264 | 1 | |a Newcastle-upon-Tyne |b Cambridge Scholars Publisher |c 2018 | |
264 | 4 | |c ©2019 | |
300 | |a 1 Online-Ressource (201 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Table of Contents -- Epigraph -- Foreword -- Preface -- Acknowledgment -- List of Figures -- List of Tables -- Chapter One -- The Cyberspace -- The Growth of Cybercrime -- The Need for Cybersecurity -- The Plan and Appeal -- Chapter Two -- Abstract -- Introduction -- SVM with Clustering for Training -- Clustering Tree Based on SVM, CT-SVM -- Feed-Forward Neural Networks -- Elman Recurrent Neural Networks -- Recurrent Neural Networks (RNN) -- Real-Time Recurrent Learning Algorithm -- Characteristic Features of the Proposed System -- Conclusion -- References -- Chapter Three -- Abstract -- Introduction -- Statement of the Problem -- Aim and Objectives -- Research Questions -- Hypotheses -- Theoretical Framework -- Methodology -- Results -- Discussion of Findings -- Conclusion -- Recommendations -- References -- Chapter Four -- Abstract -- Introduction -- Cloud Computing -- Common Characteristics -- Essential Characteristics -- Cloud Deployments Models -- Some Commercial Cloud Offerings -- Peer-to-peer Cloud Computing -- Security Challenges in Peer-to-Peer Cloud Computing -- Privacy and Identity of P2P Cloud Computing Users -- Poisoning the Peer-to-Peer Cloud Network -- Blocking of P2P Traffic by ISP -- Conclusion -- References -- Chapter Five -- Abstract -- Introduction -- Information Technology and Electronically Generated Offenses -- Computer Crime and Cybercrime -- Child Pornography -- Spamming -- The Problem of Proof of Electronically Generated Evidence as Documentary Evidence -- Cybercrime in Nigeria -- Impediments to the Enforcement of Cybercrime Laws -- Conclusion -- References -- Chapter Six -- Abstract -- Introduction -- Security Properties of E-Voting -- Why Use E-Voting -- Materials and Methods -- Proposed System Features Description -- Proposed System Architecture | |
505 | 8 | |a Modeling the E-Voting Application Using the Unified Modeling Language (UML) -- Class Diagram -- Association Diagram -- Use Case Diagram -- Information Engineering -- Result and Discussion -- Conclusion -- References -- Chapter Seven -- Introduction -- Technical Protective Measures -- Physical Protective Measures -- Personnel Protective Measures -- Mitigating Risks Associated with Personnel -- Managing Risk Associated with Perso -- Security Awareness -- Computer Security or Cybersecurity or IT Security -- A Culture of Security Awareness -- Creating a Security Culture -- Acknowledging Security Issues -- Accepting Responsibility -- Assessing Risk -- Crafting Security Policies -- Training at all Levels -- Creating Benchmarks for Success -- Security Audits -- Creating Security Operations -- Building a Successful Team -- Planning for Disaster -- Conclusion -- References -- Chapter Eight -- Abstract -- Introduction -- Necessity and Scope -- Case Study -- Instructions -- Online Monitoring Software and Its Usage -- Remote Desktop as an Anti-Monitoring Tool -- Functional Analysis of Online Monitoring Software -- Observation and Information Gathering -- Hypothesis Formation and Evaluation -- Results Discussion -- Offender's Computer Literacy Level as a Function of Monitoring Software Suitability -- Summary of Study Conclusions -- Informed Opinion -- Future Work -- References -- Chapter Nine -- Abstract -- Introduction -- eDiscovery Preparedness -- eDiscovery Preparedness of WordPress CMS -- eDiscovery Preparedness of Apache Web Server -- Setting up mod_log_forensic module -- Configuring mod_log_forensic -- Results and Evaluation -- Log Analysis of SQL Injection Attack -- Analyzing the Suspect Computer -- Conclusion -- References -- Chapter Ten -- Abstract -- Introduction -- Literature Review -- Review of Some Related Work -- Methodology Used | |
505 | 8 | |a System Development -- Filter a Research Topic -- Quit Application -- Conclusion -- References -- Chapter Eleven -- Abstract -- Introduction -- Literature Review -- First Generation Smart Home Systems -- Second Generation Smart Home Systems -- Third Generation Smart Home Systems -- System Design -- The Desktop Application Design -- Apply Timing -- Web-Based Application Design -- LOGIN.ASPX -- REMOTE.ASPX -- The Database Design -- Hardware Design -- Microcontroller 8052 -- Serial Port -- Common Applications for Serial Ports -- The Relays -- Methodology -- Data Collection -- System Testing -- Results -- Conclusion/Future Direction -- References -- Chapter Twelve -- Prevention of Cross-Site Scripting Attacks Based on Positive Security Model for Server-Side Solution -- Efficient Distribution of Scheduled Cloud and Grid Computing Using Peer-to-Peer Network -- Toward the Implementation of a Computerized Database for Data Management in Nigerian Breweries -- Contributors -- Index | |
520 | |a This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world | ||
650 | 4 | |a Electronic commerce-Security measures.. | |
650 | 4 | |a Computer security-Government policy.. | |
650 | 4 | |a Computer security-Law and legislation | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Anyanwu, Longy O. |t Safe Computing for Emerging Economies |d Newcastle-upon-Tyne : Cambridge Scholars Publisher,c2018 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033081754 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=5639187 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804183185844600832 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Anyanwu, Longy O. |
author_facet | Anyanwu, Longy O. |
author_role | aut |
author_sort | Anyanwu, Longy O. |
author_variant | l o a lo loa |
building | Verbundindex |
bvnumber | BV047697789 |
collection | ZDB-30-PQE |
contents | Intro -- Table of Contents -- Epigraph -- Foreword -- Preface -- Acknowledgment -- List of Figures -- List of Tables -- Chapter One -- The Cyberspace -- The Growth of Cybercrime -- The Need for Cybersecurity -- The Plan and Appeal -- Chapter Two -- Abstract -- Introduction -- SVM with Clustering for Training -- Clustering Tree Based on SVM, CT-SVM -- Feed-Forward Neural Networks -- Elman Recurrent Neural Networks -- Recurrent Neural Networks (RNN) -- Real-Time Recurrent Learning Algorithm -- Characteristic Features of the Proposed System -- Conclusion -- References -- Chapter Three -- Abstract -- Introduction -- Statement of the Problem -- Aim and Objectives -- Research Questions -- Hypotheses -- Theoretical Framework -- Methodology -- Results -- Discussion of Findings -- Conclusion -- Recommendations -- References -- Chapter Four -- Abstract -- Introduction -- Cloud Computing -- Common Characteristics -- Essential Characteristics -- Cloud Deployments Models -- Some Commercial Cloud Offerings -- Peer-to-peer Cloud Computing -- Security Challenges in Peer-to-Peer Cloud Computing -- Privacy and Identity of P2P Cloud Computing Users -- Poisoning the Peer-to-Peer Cloud Network -- Blocking of P2P Traffic by ISP -- Conclusion -- References -- Chapter Five -- Abstract -- Introduction -- Information Technology and Electronically Generated Offenses -- Computer Crime and Cybercrime -- Child Pornography -- Spamming -- The Problem of Proof of Electronically Generated Evidence as Documentary Evidence -- Cybercrime in Nigeria -- Impediments to the Enforcement of Cybercrime Laws -- Conclusion -- References -- Chapter Six -- Abstract -- Introduction -- Security Properties of E-Voting -- Why Use E-Voting -- Materials and Methods -- Proposed System Features Description -- Proposed System Architecture Modeling the E-Voting Application Using the Unified Modeling Language (UML) -- Class Diagram -- Association Diagram -- Use Case Diagram -- Information Engineering -- Result and Discussion -- Conclusion -- References -- Chapter Seven -- Introduction -- Technical Protective Measures -- Physical Protective Measures -- Personnel Protective Measures -- Mitigating Risks Associated with Personnel -- Managing Risk Associated with Perso -- Security Awareness -- Computer Security or Cybersecurity or IT Security -- A Culture of Security Awareness -- Creating a Security Culture -- Acknowledging Security Issues -- Accepting Responsibility -- Assessing Risk -- Crafting Security Policies -- Training at all Levels -- Creating Benchmarks for Success -- Security Audits -- Creating Security Operations -- Building a Successful Team -- Planning for Disaster -- Conclusion -- References -- Chapter Eight -- Abstract -- Introduction -- Necessity and Scope -- Case Study -- Instructions -- Online Monitoring Software and Its Usage -- Remote Desktop as an Anti-Monitoring Tool -- Functional Analysis of Online Monitoring Software -- Observation and Information Gathering -- Hypothesis Formation and Evaluation -- Results Discussion -- Offender's Computer Literacy Level as a Function of Monitoring Software Suitability -- Summary of Study Conclusions -- Informed Opinion -- Future Work -- References -- Chapter Nine -- Abstract -- Introduction -- eDiscovery Preparedness -- eDiscovery Preparedness of WordPress CMS -- eDiscovery Preparedness of Apache Web Server -- Setting up mod_log_forensic module -- Configuring mod_log_forensic -- Results and Evaluation -- Log Analysis of SQL Injection Attack -- Analyzing the Suspect Computer -- Conclusion -- References -- Chapter Ten -- Abstract -- Introduction -- Literature Review -- Review of Some Related Work -- Methodology Used System Development -- Filter a Research Topic -- Quit Application -- Conclusion -- References -- Chapter Eleven -- Abstract -- Introduction -- Literature Review -- First Generation Smart Home Systems -- Second Generation Smart Home Systems -- Third Generation Smart Home Systems -- System Design -- The Desktop Application Design -- Apply Timing -- Web-Based Application Design -- LOGIN.ASPX -- REMOTE.ASPX -- The Database Design -- Hardware Design -- Microcontroller 8052 -- Serial Port -- Common Applications for Serial Ports -- The Relays -- Methodology -- Data Collection -- System Testing -- Results -- Conclusion/Future Direction -- References -- Chapter Twelve -- Prevention of Cross-Site Scripting Attacks Based on Positive Security Model for Server-Side Solution -- Efficient Distribution of Scheduled Cloud and Grid Computing Using Peer-to-Peer Network -- Toward the Implementation of a Computerized Database for Data Management in Nigerian Breweries -- Contributors -- Index |
ctrlnum | (ZDB-30-PQE)EBC5639187 (ZDB-30-PAD)EBC5639187 (ZDB-89-EBL)EBL5639187 (ZDB-38-EBR)ebr11648471 (OCoLC)1083097009 (DE-599)BVBBV047697789 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06853nmm a2200457zc 4500</leader><controlfield tag="001">BV047697789</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220120s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781527525948</subfield><subfield code="9">978-1-5275-2594-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC5639187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC5639187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL5639187</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr11648471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083097009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047697789</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Anyanwu, Longy O.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Safe Computing for Emerging Economies</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newcastle-upon-Tyne</subfield><subfield code="b">Cambridge Scholars Publisher</subfield><subfield code="c">2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (201 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Table of Contents -- Epigraph -- Foreword -- Preface -- Acknowledgment -- List of Figures -- List of Tables -- Chapter One -- The Cyberspace -- The Growth of Cybercrime -- The Need for Cybersecurity -- The Plan and Appeal -- Chapter Two -- Abstract -- Introduction -- SVM with Clustering for Training -- Clustering Tree Based on SVM, CT-SVM -- Feed-Forward Neural Networks -- Elman Recurrent Neural Networks -- Recurrent Neural Networks (RNN) -- Real-Time Recurrent Learning Algorithm -- Characteristic Features of the Proposed System -- Conclusion -- References -- Chapter Three -- Abstract -- Introduction -- Statement of the Problem -- Aim and Objectives -- Research Questions -- Hypotheses -- Theoretical Framework -- Methodology -- Results -- Discussion of Findings -- Conclusion -- Recommendations -- References -- Chapter Four -- Abstract -- Introduction -- Cloud Computing -- Common Characteristics -- Essential Characteristics -- Cloud Deployments Models -- Some Commercial Cloud Offerings -- Peer-to-peer Cloud Computing -- Security Challenges in Peer-to-Peer Cloud Computing -- Privacy and Identity of P2P Cloud Computing Users -- Poisoning the Peer-to-Peer Cloud Network -- Blocking of P2P Traffic by ISP -- Conclusion -- References -- Chapter Five -- Abstract -- Introduction -- Information Technology and Electronically Generated Offenses -- Computer Crime and Cybercrime -- Child Pornography -- Spamming -- The Problem of Proof of Electronically Generated Evidence as Documentary Evidence -- Cybercrime in Nigeria -- Impediments to the Enforcement of Cybercrime Laws -- Conclusion -- References -- Chapter Six -- Abstract -- Introduction -- Security Properties of E-Voting -- Why Use E-Voting -- Materials and Methods -- Proposed System Features Description -- Proposed System Architecture</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Modeling the E-Voting Application Using the Unified Modeling Language (UML) -- Class Diagram -- Association Diagram -- Use Case Diagram -- Information Engineering -- Result and Discussion -- Conclusion -- References -- Chapter Seven -- Introduction -- Technical Protective Measures -- Physical Protective Measures -- Personnel Protective Measures -- Mitigating Risks Associated with Personnel -- Managing Risk Associated with Perso -- Security Awareness -- Computer Security or Cybersecurity or IT Security -- A Culture of Security Awareness -- Creating a Security Culture -- Acknowledging Security Issues -- Accepting Responsibility -- Assessing Risk -- Crafting Security Policies -- Training at all Levels -- Creating Benchmarks for Success -- Security Audits -- Creating Security Operations -- Building a Successful Team -- Planning for Disaster -- Conclusion -- References -- Chapter Eight -- Abstract -- Introduction -- Necessity and Scope -- Case Study -- Instructions -- Online Monitoring Software and Its Usage -- Remote Desktop as an Anti-Monitoring Tool -- Functional Analysis of Online Monitoring Software -- Observation and Information Gathering -- Hypothesis Formation and Evaluation -- Results Discussion -- Offender's Computer Literacy Level as a Function of Monitoring Software Suitability -- Summary of Study Conclusions -- Informed Opinion -- Future Work -- References -- Chapter Nine -- Abstract -- Introduction -- eDiscovery Preparedness -- eDiscovery Preparedness of WordPress CMS -- eDiscovery Preparedness of Apache Web Server -- Setting up mod_log_forensic module -- Configuring mod_log_forensic -- Results and Evaluation -- Log Analysis of SQL Injection Attack -- Analyzing the Suspect Computer -- Conclusion -- References -- Chapter Ten -- Abstract -- Introduction -- Literature Review -- Review of Some Related Work -- Methodology Used</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">System Development -- Filter a Research Topic -- Quit Application -- Conclusion -- References -- Chapter Eleven -- Abstract -- Introduction -- Literature Review -- First Generation Smart Home Systems -- Second Generation Smart Home Systems -- Third Generation Smart Home Systems -- System Design -- The Desktop Application Design -- Apply Timing -- Web-Based Application Design -- LOGIN.ASPX -- REMOTE.ASPX -- The Database Design -- Hardware Design -- Microcontroller 8052 -- Serial Port -- Common Applications for Serial Ports -- The Relays -- Methodology -- Data Collection -- System Testing -- Results -- Conclusion/Future Direction -- References -- Chapter Twelve -- Prevention of Cross-Site Scripting Attacks Based on Positive Security Model for Server-Side Solution -- Efficient Distribution of Scheduled Cloud and Grid Computing Using Peer-to-Peer Network -- Toward the Implementation of a Computerized Database for Data Management in Nigerian Breweries -- Contributors -- Index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce-Security measures..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security-Government policy..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security-Law and legislation</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Anyanwu, Longy O.</subfield><subfield code="t">Safe Computing for Emerging Economies</subfield><subfield code="d">Newcastle-upon-Tyne : Cambridge Scholars Publisher,c2018</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033081754</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=5639187</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047697789 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:58:07Z |
indexdate | 2024-07-10T09:19:26Z |
institution | BVB |
isbn | 9781527525948 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033081754 |
oclc_num | 1083097009 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (201 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Cambridge Scholars Publisher |
record_format | marc |
spelling | Anyanwu, Longy O. Verfasser aut Safe Computing for Emerging Economies Newcastle-upon-Tyne Cambridge Scholars Publisher 2018 ©2019 1 Online-Ressource (201 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Intro -- Table of Contents -- Epigraph -- Foreword -- Preface -- Acknowledgment -- List of Figures -- List of Tables -- Chapter One -- The Cyberspace -- The Growth of Cybercrime -- The Need for Cybersecurity -- The Plan and Appeal -- Chapter Two -- Abstract -- Introduction -- SVM with Clustering for Training -- Clustering Tree Based on SVM, CT-SVM -- Feed-Forward Neural Networks -- Elman Recurrent Neural Networks -- Recurrent Neural Networks (RNN) -- Real-Time Recurrent Learning Algorithm -- Characteristic Features of the Proposed System -- Conclusion -- References -- Chapter Three -- Abstract -- Introduction -- Statement of the Problem -- Aim and Objectives -- Research Questions -- Hypotheses -- Theoretical Framework -- Methodology -- Results -- Discussion of Findings -- Conclusion -- Recommendations -- References -- Chapter Four -- Abstract -- Introduction -- Cloud Computing -- Common Characteristics -- Essential Characteristics -- Cloud Deployments Models -- Some Commercial Cloud Offerings -- Peer-to-peer Cloud Computing -- Security Challenges in Peer-to-Peer Cloud Computing -- Privacy and Identity of P2P Cloud Computing Users -- Poisoning the Peer-to-Peer Cloud Network -- Blocking of P2P Traffic by ISP -- Conclusion -- References -- Chapter Five -- Abstract -- Introduction -- Information Technology and Electronically Generated Offenses -- Computer Crime and Cybercrime -- Child Pornography -- Spamming -- The Problem of Proof of Electronically Generated Evidence as Documentary Evidence -- Cybercrime in Nigeria -- Impediments to the Enforcement of Cybercrime Laws -- Conclusion -- References -- Chapter Six -- Abstract -- Introduction -- Security Properties of E-Voting -- Why Use E-Voting -- Materials and Methods -- Proposed System Features Description -- Proposed System Architecture Modeling the E-Voting Application Using the Unified Modeling Language (UML) -- Class Diagram -- Association Diagram -- Use Case Diagram -- Information Engineering -- Result and Discussion -- Conclusion -- References -- Chapter Seven -- Introduction -- Technical Protective Measures -- Physical Protective Measures -- Personnel Protective Measures -- Mitigating Risks Associated with Personnel -- Managing Risk Associated with Perso -- Security Awareness -- Computer Security or Cybersecurity or IT Security -- A Culture of Security Awareness -- Creating a Security Culture -- Acknowledging Security Issues -- Accepting Responsibility -- Assessing Risk -- Crafting Security Policies -- Training at all Levels -- Creating Benchmarks for Success -- Security Audits -- Creating Security Operations -- Building a Successful Team -- Planning for Disaster -- Conclusion -- References -- Chapter Eight -- Abstract -- Introduction -- Necessity and Scope -- Case Study -- Instructions -- Online Monitoring Software and Its Usage -- Remote Desktop as an Anti-Monitoring Tool -- Functional Analysis of Online Monitoring Software -- Observation and Information Gathering -- Hypothesis Formation and Evaluation -- Results Discussion -- Offender's Computer Literacy Level as a Function of Monitoring Software Suitability -- Summary of Study Conclusions -- Informed Opinion -- Future Work -- References -- Chapter Nine -- Abstract -- Introduction -- eDiscovery Preparedness -- eDiscovery Preparedness of WordPress CMS -- eDiscovery Preparedness of Apache Web Server -- Setting up mod_log_forensic module -- Configuring mod_log_forensic -- Results and Evaluation -- Log Analysis of SQL Injection Attack -- Analyzing the Suspect Computer -- Conclusion -- References -- Chapter Ten -- Abstract -- Introduction -- Literature Review -- Review of Some Related Work -- Methodology Used System Development -- Filter a Research Topic -- Quit Application -- Conclusion -- References -- Chapter Eleven -- Abstract -- Introduction -- Literature Review -- First Generation Smart Home Systems -- Second Generation Smart Home Systems -- Third Generation Smart Home Systems -- System Design -- The Desktop Application Design -- Apply Timing -- Web-Based Application Design -- LOGIN.ASPX -- REMOTE.ASPX -- The Database Design -- Hardware Design -- Microcontroller 8052 -- Serial Port -- Common Applications for Serial Ports -- The Relays -- Methodology -- Data Collection -- System Testing -- Results -- Conclusion/Future Direction -- References -- Chapter Twelve -- Prevention of Cross-Site Scripting Attacks Based on Positive Security Model for Server-Side Solution -- Efficient Distribution of Scheduled Cloud and Grid Computing Using Peer-to-Peer Network -- Toward the Implementation of a Computerized Database for Data Management in Nigerian Breweries -- Contributors -- Index This book highlights the predicaments of the emerging economies of developing countries in the light of the digital divide between these countries and the more developed economies. Particularly, it underscores the dangers these economies face and how those assets may be secured or securely operated. The book delineates the present insecurities in e-business and e-commerce as these emerging economies expand. As such, it will be of interest to governmental entities, businesses, researchers, economists, computer and Internet operatives, and indeed all participants in this technological world Electronic commerce-Security measures.. Computer security-Government policy.. Computer security-Law and legislation Erscheint auch als Druck-Ausgabe Anyanwu, Longy O. Safe Computing for Emerging Economies Newcastle-upon-Tyne : Cambridge Scholars Publisher,c2018 |
spellingShingle | Anyanwu, Longy O. Safe Computing for Emerging Economies Intro -- Table of Contents -- Epigraph -- Foreword -- Preface -- Acknowledgment -- List of Figures -- List of Tables -- Chapter One -- The Cyberspace -- The Growth of Cybercrime -- The Need for Cybersecurity -- The Plan and Appeal -- Chapter Two -- Abstract -- Introduction -- SVM with Clustering for Training -- Clustering Tree Based on SVM, CT-SVM -- Feed-Forward Neural Networks -- Elman Recurrent Neural Networks -- Recurrent Neural Networks (RNN) -- Real-Time Recurrent Learning Algorithm -- Characteristic Features of the Proposed System -- Conclusion -- References -- Chapter Three -- Abstract -- Introduction -- Statement of the Problem -- Aim and Objectives -- Research Questions -- Hypotheses -- Theoretical Framework -- Methodology -- Results -- Discussion of Findings -- Conclusion -- Recommendations -- References -- Chapter Four -- Abstract -- Introduction -- Cloud Computing -- Common Characteristics -- Essential Characteristics -- Cloud Deployments Models -- Some Commercial Cloud Offerings -- Peer-to-peer Cloud Computing -- Security Challenges in Peer-to-Peer Cloud Computing -- Privacy and Identity of P2P Cloud Computing Users -- Poisoning the Peer-to-Peer Cloud Network -- Blocking of P2P Traffic by ISP -- Conclusion -- References -- Chapter Five -- Abstract -- Introduction -- Information Technology and Electronically Generated Offenses -- Computer Crime and Cybercrime -- Child Pornography -- Spamming -- The Problem of Proof of Electronically Generated Evidence as Documentary Evidence -- Cybercrime in Nigeria -- Impediments to the Enforcement of Cybercrime Laws -- Conclusion -- References -- Chapter Six -- Abstract -- Introduction -- Security Properties of E-Voting -- Why Use E-Voting -- Materials and Methods -- Proposed System Features Description -- Proposed System Architecture Modeling the E-Voting Application Using the Unified Modeling Language (UML) -- Class Diagram -- Association Diagram -- Use Case Diagram -- Information Engineering -- Result and Discussion -- Conclusion -- References -- Chapter Seven -- Introduction -- Technical Protective Measures -- Physical Protective Measures -- Personnel Protective Measures -- Mitigating Risks Associated with Personnel -- Managing Risk Associated with Perso -- Security Awareness -- Computer Security or Cybersecurity or IT Security -- A Culture of Security Awareness -- Creating a Security Culture -- Acknowledging Security Issues -- Accepting Responsibility -- Assessing Risk -- Crafting Security Policies -- Training at all Levels -- Creating Benchmarks for Success -- Security Audits -- Creating Security Operations -- Building a Successful Team -- Planning for Disaster -- Conclusion -- References -- Chapter Eight -- Abstract -- Introduction -- Necessity and Scope -- Case Study -- Instructions -- Online Monitoring Software and Its Usage -- Remote Desktop as an Anti-Monitoring Tool -- Functional Analysis of Online Monitoring Software -- Observation and Information Gathering -- Hypothesis Formation and Evaluation -- Results Discussion -- Offender's Computer Literacy Level as a Function of Monitoring Software Suitability -- Summary of Study Conclusions -- Informed Opinion -- Future Work -- References -- Chapter Nine -- Abstract -- Introduction -- eDiscovery Preparedness -- eDiscovery Preparedness of WordPress CMS -- eDiscovery Preparedness of Apache Web Server -- Setting up mod_log_forensic module -- Configuring mod_log_forensic -- Results and Evaluation -- Log Analysis of SQL Injection Attack -- Analyzing the Suspect Computer -- Conclusion -- References -- Chapter Ten -- Abstract -- Introduction -- Literature Review -- Review of Some Related Work -- Methodology Used System Development -- Filter a Research Topic -- Quit Application -- Conclusion -- References -- Chapter Eleven -- Abstract -- Introduction -- Literature Review -- First Generation Smart Home Systems -- Second Generation Smart Home Systems -- Third Generation Smart Home Systems -- System Design -- The Desktop Application Design -- Apply Timing -- Web-Based Application Design -- LOGIN.ASPX -- REMOTE.ASPX -- The Database Design -- Hardware Design -- Microcontroller 8052 -- Serial Port -- Common Applications for Serial Ports -- The Relays -- Methodology -- Data Collection -- System Testing -- Results -- Conclusion/Future Direction -- References -- Chapter Twelve -- Prevention of Cross-Site Scripting Attacks Based on Positive Security Model for Server-Side Solution -- Efficient Distribution of Scheduled Cloud and Grid Computing Using Peer-to-Peer Network -- Toward the Implementation of a Computerized Database for Data Management in Nigerian Breweries -- Contributors -- Index Electronic commerce-Security measures.. Computer security-Government policy.. Computer security-Law and legislation |
title | Safe Computing for Emerging Economies |
title_auth | Safe Computing for Emerging Economies |
title_exact_search | Safe Computing for Emerging Economies |
title_exact_search_txtP | Safe Computing for Emerging Economies |
title_full | Safe Computing for Emerging Economies |
title_fullStr | Safe Computing for Emerging Economies |
title_full_unstemmed | Safe Computing for Emerging Economies |
title_short | Safe Computing for Emerging Economies |
title_sort | safe computing for emerging economies |
topic | Electronic commerce-Security measures.. Computer security-Government policy.. Computer security-Law and legislation |
topic_facet | Electronic commerce-Security measures.. Computer security-Government policy.. Computer security-Law and legislation |
work_keys_str_mv | AT anyanwulongyo safecomputingforemergingeconomies |