• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hírek

  • 0
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics by Khurana, Mehak; Mahajan, Shilpa;

    A Data Centric Approach to Information Security

    Sorozatcím: Chapman & Hall/CRC Cyber-Physical Systems;

      • 20% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 145.00
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        73 384 Ft (69 890 Ft + 5% áfa)
      • Kedvezmény(ek) 20% (cc. 14 677 Ft off)
      • Discounted price 58 708 Ft (55 912 Ft + 5% áfa)

    Beszerezhetőség

    Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
    A Prosperónál jelenleg nincsen raktáron.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    Rövid leírás:

    This book discusses a range of topics from information security to cryptography, mobile application attacks to Digital forensics and from Cybersecurity to Blockchain. The goal of the book is to provide a 360-degree view of cybersecurity to the readers with demonstration of practical applications.

    Több

    Hosszú leírás:


    The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data.



    Features





    • Helps to develop an understanding of how to acquire, prepare, visualize security data.



    • Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons.



    • Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area.?



    • Designs analytical models to help detect malicious behaviour.



    The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.



    ?


    ?


    ?

    Több

    Tartalomjegyzék:

    1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft-max-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier-Penalty Function for developing privacy mechanism in cyber physical system.

    Több
    Mostanában megtekintett
    previous
    Security Analytics: A Data Centric Approach to Information Security

    Security Analytics: A Data Centric Approach to Information Security

    Khurana, Mehak; Mahajan, Shilpa; (ed.)

    73 384 Ft

    next