Countering cyber attacks and preserving the integrity and availability of critical systems:
"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- |
Beschreibung: | 30 PDFs (xxix, 334 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522582427 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00216517 | ||
003 | IGIG | ||
005 | 20190130123650.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190131s2019 pau fob 001 0 eng d | ||
010 | |z 2018052157 | ||
020 | |a 9781522582427 |q ebook | ||
020 | |z 9781522582410 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-8241-0 |2 doi | |
035 | |a (CaBNVSL)slc20725290 | ||
035 | |a (OCoLC)1083907114 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .C648 2019e | |
082 | 7 | |a 005.8/2 |2 23 | |
245 | 0 | 0 | |a Countering cyber attacks and preserving the integrity and availability of critical systems |c S. Geetha and Asnath Victy Phamila, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2019] | |
300 | |a 30 PDFs (xxix, 334 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. National security and cyber warfare. Chapter 1. Digital forensics and cyber law enforcement ; Chapter 2. The fundamentals of digital forensics and cyber law ; Chapter 3. An Indian and global perspective on cybercrime ; Chapter 4. Smart video surveillance systems and identification of human behavior analysis -- Section 2. Critical IoT infrastructure security. Chapter 5. IoT evolution and security challenges in cyber space: IoT security ; Chapter 6. Network intrusion detection and prevention systems for attacks in IoT systems ; Chapter 7. Study on query-based information extraction in IoT-integrated wireless sensor networks ; Chapter 8. Lightweight secure architectural framework for internet of things -- Section 3. Emerging trends and methods for cyber forensics. Chapter 9. The role of artificial intelligence in cyber security ; Chapter 10. Techniques for analysis of mobile malware ; Chapter 11. Intelligent malware detection using deep dilated residual networks for cyber security ; Chapter 12. Security framework for smart visual sensor networks -- Section 4. Techniques for countering cyber attacks. Chapter 13. Blockchain technology is a boost to cyber security: block chain ; Chapter 14. Secured information exchange using Haptic codes ; Chapter 15. Real-time ECG-based biometric authentication system ; Chapter 16. Digital healthcare security issues: is there a solution in biometrics?. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 01/31/2019). | ||
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer security. | |
700 | 1 | |a Geetha, S. |d 1979- |e editor. | |
700 | 1 | |a Phamila, Asnath Victy |d 1978- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018052157 | |
776 | 0 | 8 | |i Print version: |z 152258241X |z 9781522582410 |w (DLC) 2018052157 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00216517 |
---|---|
_version_ | 1816797081409421312 |
adam_text | |
any_adam_object | |
author2 | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
author2_role | edt edt |
author2_variant | s g sg a v p av avp |
author_facet | Geetha, S. 1979- Phamila, Asnath Victy 1978- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .C648 2019e |
callnumber-search | TK5105.59 .C648 2019e |
callnumber-sort | TK 45105.59 C648 42019E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Section 1. National security and cyber warfare. Chapter 1. Digital forensics and cyber law enforcement ; Chapter 2. The fundamentals of digital forensics and cyber law ; Chapter 3. An Indian and global perspective on cybercrime ; Chapter 4. Smart video surveillance systems and identification of human behavior analysis -- Section 2. Critical IoT infrastructure security. Chapter 5. IoT evolution and security challenges in cyber space: IoT security ; Chapter 6. Network intrusion detection and prevention systems for attacks in IoT systems ; Chapter 7. Study on query-based information extraction in IoT-integrated wireless sensor networks ; Chapter 8. Lightweight secure architectural framework for internet of things -- Section 3. Emerging trends and methods for cyber forensics. Chapter 9. The role of artificial intelligence in cyber security ; Chapter 10. Techniques for analysis of mobile malware ; Chapter 11. Intelligent malware detection using deep dilated residual networks for cyber security ; Chapter 12. Security framework for smart visual sensor networks -- Section 4. Techniques for countering cyber attacks. Chapter 13. Blockchain technology is a boost to cyber security: block chain ; Chapter 14. Secured information exchange using Haptic codes ; Chapter 15. Real-time ECG-based biometric authentication system ; Chapter 16. Digital healthcare security issues: is there a solution in biometrics?. |
ctrlnum | (CaBNVSL)slc20725290 (OCoLC)1083907114 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03589nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00216517</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190130123650.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190131s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018052157</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522582427</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522582410</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-8241-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20725290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083907114</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C648 2019e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Countering cyber attacks and preserving the integrity and availability of critical systems </subfield><subfield code="c">S. Geetha and Asnath Victy Phamila, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">30 PDFs (xxix, 334 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. National security and cyber warfare. Chapter 1. Digital forensics and cyber law enforcement ; Chapter 2. The fundamentals of digital forensics and cyber law ; Chapter 3. An Indian and global perspective on cybercrime ; Chapter 4. Smart video surveillance systems and identification of human behavior analysis -- Section 2. Critical IoT infrastructure security. Chapter 5. IoT evolution and security challenges in cyber space: IoT security ; Chapter 6. Network intrusion detection and prevention systems for attacks in IoT systems ; Chapter 7. Study on query-based information extraction in IoT-integrated wireless sensor networks ; Chapter 8. Lightweight secure architectural framework for internet of things -- Section 3. Emerging trends and methods for cyber forensics. Chapter 9. The role of artificial intelligence in cyber security ; Chapter 10. Techniques for analysis of mobile malware ; Chapter 11. Intelligent malware detection using deep dilated residual networks for cyber security ; Chapter 12. Security framework for smart visual sensor networks -- Section 4. Techniques for countering cyber attacks. Chapter 13. Blockchain technology is a boost to cyber security: block chain ; Chapter 14. Secured information exchange using Haptic codes ; Chapter 15. Real-time ECG-based biometric authentication system ; Chapter 16. Digital healthcare security issues: is there a solution in biometrics?.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/31/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Geetha, S.</subfield><subfield code="d">1979-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Phamila, Asnath Victy</subfield><subfield code="d">1978-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018052157</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">152258241X</subfield><subfield code="z">9781522582410</subfield><subfield code="w">(DLC) 2018052157</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00216517 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:54Z |
institution | BVB |
isbn | 9781522582427 |
language | English |
oclc_num | 1083907114 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 30 PDFs (xxix, 334 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2019] 30 PDFs (xxix, 334 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. National security and cyber warfare. Chapter 1. Digital forensics and cyber law enforcement ; Chapter 2. The fundamentals of digital forensics and cyber law ; Chapter 3. An Indian and global perspective on cybercrime ; Chapter 4. Smart video surveillance systems and identification of human behavior analysis -- Section 2. Critical IoT infrastructure security. Chapter 5. IoT evolution and security challenges in cyber space: IoT security ; Chapter 6. Network intrusion detection and prevention systems for attacks in IoT systems ; Chapter 7. Study on query-based information extraction in IoT-integrated wireless sensor networks ; Chapter 8. Lightweight secure architectural framework for internet of things -- Section 3. Emerging trends and methods for cyber forensics. Chapter 9. The role of artificial intelligence in cyber security ; Chapter 10. Techniques for analysis of mobile malware ; Chapter 11. Intelligent malware detection using deep dilated residual networks for cyber security ; Chapter 12. Security framework for smart visual sensor networks -- Section 4. Techniques for countering cyber attacks. Chapter 13. Blockchain technology is a boost to cyber security: block chain ; Chapter 14. Secured information exchange using Haptic codes ; Chapter 15. Real-time ECG-based biometric authentication system ; Chapter 16. Digital healthcare security issues: is there a solution in biometrics?. Restricted to subscribers or individual electronic text purchasers. "This book focuses on advances in theory, design and development, implementation, analysis, empirical evaluation and verification of cyber security systems. It also explores advances in cyber security that will help in thwarting future sophisticated attacks, vulnerability-threats, data-breaches, fraud, and system-damage"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 01/31/2019). Computer crimes Prevention. Computer networks Security measures. Computer security. Geetha, S. 1979- editor. Phamila, Asnath Victy 1978- editor. IGI Global, publisher. (Original) (DLC)2018052157 Print version: 152258241X 9781522582410 (DLC) 2018052157 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 Volltext |
spellingShingle | Countering cyber attacks and preserving the integrity and availability of critical systems Section 1. National security and cyber warfare. Chapter 1. Digital forensics and cyber law enforcement ; Chapter 2. The fundamentals of digital forensics and cyber law ; Chapter 3. An Indian and global perspective on cybercrime ; Chapter 4. Smart video surveillance systems and identification of human behavior analysis -- Section 2. Critical IoT infrastructure security. Chapter 5. IoT evolution and security challenges in cyber space: IoT security ; Chapter 6. Network intrusion detection and prevention systems for attacks in IoT systems ; Chapter 7. Study on query-based information extraction in IoT-integrated wireless sensor networks ; Chapter 8. Lightweight secure architectural framework for internet of things -- Section 3. Emerging trends and methods for cyber forensics. Chapter 9. The role of artificial intelligence in cyber security ; Chapter 10. Techniques for analysis of mobile malware ; Chapter 11. Intelligent malware detection using deep dilated residual networks for cyber security ; Chapter 12. Security framework for smart visual sensor networks -- Section 4. Techniques for countering cyber attacks. Chapter 13. Blockchain technology is a boost to cyber security: block chain ; Chapter 14. Secured information exchange using Haptic codes ; Chapter 15. Real-time ECG-based biometric authentication system ; Chapter 16. Digital healthcare security issues: is there a solution in biometrics?. Computer crimes Prevention. Computer networks Security measures. Computer security. |
title | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_auth | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_exact_search | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_full | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors. |
title_fullStr | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors. |
title_full_unstemmed | Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors. |
title_short | Countering cyber attacks and preserving the integrity and availability of critical systems |
title_sort | countering cyber attacks and preserving the integrity and availability of critical systems |
topic | Computer crimes Prevention. Computer networks Security measures. Computer security. |
topic_facet | Computer crimes Prevention. Computer networks Security measures. Computer security. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0 |
work_keys_str_mv | AT geethas counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems AT phamilaasnathvicty counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems AT igiglobal counteringcyberattacksandpreservingtheintegrityandavailabilityofcriticalsystems |