Security Analytics: A Data Centric Approach to Information Security

Security Analytics

A Data Centric Approach to Information Security
 
Edition number: 1
Publisher: Chapman and Hall
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 150.00
Estimated price in HUF:
72 450 HUF (69 000 HUF + 5% VAT)
Why estimated?
 
Your price:

65 205 (62 100 HUF + 5% VAT )
discount is: 10% (approx 7 245 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
 
 
 
Product details:

ISBN13:9781032072418
ISBN10:1032072415
Binding:Hardback
No. of pages:236 pages
Size:254x178 mm
Weight:453 g
Language:English
Illustrations: 114 Illustrations, black & white; 43 Halftones, black & white; 71 Line drawings, black & white; 36 Tables, black & white
723
Category:
Short description:

This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.

Long description:


The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.



Features





  • Helps to develop an understanding of how to acquire, prepare, visualize security data.



  • Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.



  • Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.?



  • Designs analytical models to help detect malicious behaviour.



The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.



?


?


?

Table of Contents:

1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power
-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft
-max
-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier
-Penalty Function for developing privacy mechanism in cyber physical system.