• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • 0
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics by Khurana, Mehak; Mahajan, Shilpa;

    A Data Centric Approach to Information Security

    Series: Chapman & Hall/CRC Cyber-Physical Systems;

      • GET 20% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 145.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        73 384 Ft (69 890 Ft + 5% VAT)
      • Discount 20% (cc. 14 677 Ft off)
      • Discounted price 58 708 Ft (55 912 Ft + 5% VAT)

    73 384 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 1
    • Publisher Chapman and Hall
    • Date of Publication 24 June 2022

    • ISBN 9781032072418
    • Binding Hardback
    • No. of pages236 pages
    • Size 254x178 mm
    • Weight 453 g
    • Language English
    • Illustrations 114 Illustrations, black & white; 43 Halftones, black & white; 71 Line drawings, black & white; 36 Tables, black & white
    • 555

    Categories

    Short description:

    This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.

    More

    Long description:


    The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.



    Features





    • Helps to develop an understanding of how to acquire, prepare, visualize security data.



    • Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.



    • Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.?



    • Designs analytical models to help detect malicious behaviour.



    The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.



    ?


    ?


    ?

    More

    Table of Contents:

    1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft-max-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier-Penalty Function for developing privacy mechanism in cyber physical system.

    More
    Recently viewed
    previous
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics: A Data Centric Approach to Information Security

    Khurana, Mehak; Mahajan, Shilpa; (ed.)

    73 384 HUF

    next