CHF196.05
Download est disponible immédiatement
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book.
Some of the important topics covered include:
Research and solutions for the problem of hidden image detection
Security aspects of data mining and possible solution techniques
A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
Blockchain technology and how it is crucial to the security industry
Security for the Internet of Things
Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
Security issues in the healthcare sector with existing solutions and emerging threats.
Auteur
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has authored 4 computer science books and has multiple research articles in international journals.
Raghvendra Kumar completed his PhD in the Faculty of Engineering and Technology, Jodhpur National University, India. He has authored several research papers in Scopus indexed and impact factor research journals\international conferences as well as 6 authored and 9 edited books on computer science. His areas of interest include wireless sensor network (WSN), Internet of Things, mobile application programming, ad hoc networks, cloud computing, big data, mobile computing, data mining and software engineering.
Brojo Kishore Mishra is an Associate Professor at the C. V. Raman College of Engineering (Autonomous), Bhubaneswar, India. He received his PhD degree in Computer Science from the Berhampur University in 2012. He has published more than 40 research papers in peer-reviewed journals. His research interests include data mining and big data analysis, machine learning, soft computing, and evolutionary computation.
Jyotir Moy Chatterjee is working as an Assistant Professor in the Department of Computer Science and Engineering at GD-RCET, Bhilai, C.G, India. He received his M.Tech from KIIT University, Bhubaneswar, Odisha and B.Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute University, Chennai, (Tamil Nadu). His research interests include cloud computing, big data, privacy preservation and data mining.
Manju Khari is an Assistant Professor at the Ambedkar Institute of Advanced Communication Technology and Research, Delhi, India. She holds a PhD in Computer Science & Engineering from the National Institute of Technology Patna. She has published 60 papers in refereed national and international journals and conferences. Her research interests are in software testing, software quality, software metrics, information security and nature-inspired algorithms.
Contenu
List of Figures xv
List of Tables xvii
Foreword xix
Preface xxi
Acknowledgments xxv
Acronyms xxvii
Part 1 Cybersecurity Concept
1 Introduction on Cybersecurity 3
*Ishaani Priyadarshini*
1.1 Introduction to Cybersecurity 5
1.2 Cybersecurity Objectives 6
1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) 8
1.4 Cybersecurity Roles 10
1.5 Cybercrimes 17
1.5.1 Overview 17
1.5.2 Traditional Computer Crime and Contemporary Computer Crime 18
1.5.3 Combating Crimes 21
1.6 Security Models 23
1.7 Computer Forensics 25
1.8 Cyber Insurance 27
1.8.1 Digital Citizenship 29
1.8.2 Information Warfare and its Countermeasures 31
1.8.3 Network Neutrality 33
1.8.4 Good Practices and Policies 34
1.8.5 Cybersecurity and Human Rights 35
1.9 Future of Cybersecurity 36
1.10 Conclusion 36
References 37
2 Steganography and Steganalysis 39
*Ho Thi Huong Thom, Nguyen Kim Anh*
2.1 Introduction 40
2.2 Steganography 41
2.2.1 Method for Evaluating Hidden Information Schema Security 41
2.2.2 Peak Signal-to-Noise Ratio 42
2.3 Steganalysis 42
2.3.1 Blind Detection Based on LSB 43
2.3.2 Constraint Steganalysis 45
2.4 Conclusion 46
References 46
3 Security Threats and Vulnerabilities in E-business 51
*Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das*
3.1 Introduction to e-Business 52
3.1.1 Benefits of e-Business 52
3.1.2 Business Revolution 53
3.2 Security Issues in e-Business 54
3.2.1 Vulnerabilities 54
3.2.2 Security Attacks 55
3.2.3 Malware as a Threat 55
3.3 Common Vulnerabilities in e-Business 55
3.3.1 Phishing 55
3.3.2 Cross-Site Scripting (XSS) 56
3.4 Threats in e-Business 56
3.4.1 Ransomware 56
3.4.2 Spyware 56
3.4.3 Worms 57
3.4.4 Trojan Horse 57
3.5 Prevention Mechanism 57
3.6 Conclusion 58
References 58
4 e-Commerce Security: Threats, Issues, and Methods 61
*Prerna Sharma, Deepak Gupta, Ashish Khanna*
4.1 Introduction 62
4.2 Literature Review 63
4.3 e-Commerce 63
4.3.1 Characteristics of e-Commerce Technology 63
4.3.2 Architectural Framework of e-Commerce 64
4.3.3 Advantages and Disadvantages of e-Commerce 66
4.4 Security Overview in e-Commerce 67
4.4.1 Purpose of Security in e-Commerce 67
4.4.2 Security Element at Different Levels of e-Commerce System 67
4.5 Security Issues in e-Commerce 68
4.5.1 Client Level 68
4.5.2 Front-End Servers and Software Application Level 68
4.5.3 Network and Server Level 68
4.6 Security Threats in e-Commerce 69
4.7 Security Approaches in e-Commerce 72
4.8 Comparative Analysis of Various Security Threats in e-Commerce 73
4.9 e-Commerce Security Life-Cycle Model 73
4.10 Conclusion 75
References 76
5 Cyberwar is Coming 79
*T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian*
5.1 Introduction 80
5.2 Ransomware Attacks 82
5.2.1 Petya 83
5.2.2 WannaCry 83
5.2.3 Locky 84
5.3 Are Nations Ready? 85
5.4 Conclusion 88
References 88
Part 2 Cybersecurity in Parallel and Distributed Computing Techniques
6 Introduction to Blockchain Technology 93
*Ishaani Priyadarshini*
6.1 Introduction 94 &...