Cyber Security and Network Security

Здесь есть возможность читать онлайн «Cyber Security and Network Security» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cyber Security and Network Security: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cyber Security and Network Security»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

CYBER SECUTIRY AND NETWORK SECURITY
Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.

Cyber Security and Network Security — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cyber Security and Network Security», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Table of Contents

1 Cover

2 Title Page

3 Copyright

4 Dedication

5 Preface

6 Acknowledgments

7 1 Securing Cloud-Based Enterprise Applications and Its Data 1.1 Introduction 1.2 Background and Related Works 1.3 System Design and Architecture 1.4 Methodology 1.5 Performance Analysis 1.6 Future Research Direction 1.7 Conclusion References

8 2 High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review 2.1 Introduction 2.2 Aim of the Study 2.3 Motivation for the Study 2.4 Literature Review 2.5 Research Methodology 2.6 Testing Environment Plan 2.7 Testing 2.8 Recommendations 2.9 Limitations of Present Study 2.10 Conclusions 2.11 Scope for the Future Work Acknowledgements References

9 3 Malware Identification, Analysis and Similarity 3.1 Introduction 3.2 Background and Related Works 3.3 Proposed System Design Architecture 3.4 Methodology 3.5 Performance Analysis 3.6 Future Research Direction 3.7 Conclusion References

10 4 Robust Fraud Detection Mechanism 4.1 Introduction 4.2 Related Work 4.3 Conclusion References

11 5 Blockchain-Based Identity Management Systems 5.1 Introduction 5.2 Preliminaries 5.3 Blockchain-Based Identity Management System 5.4 Discussion 5.5 Conclusion 5.6 Future Scope References

12 6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends 6.1 Introduction 6.2 Convolution Network Learning 6.3 Recurrent Neural Networks 6.4 Long Short-Term Memory Networks 6.5 Back Propagation in Neural Networks 6.6 Literature Survey on Neural Networks in Steganography 6.7 Optimization Algorithms in Neural Networks 6.8 Conclusion References

13 7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System 7.1 Introduction 7.2 Problem Formulation 7.3 Proposed Mechanism 7.4 Experimental Results 7.5 Future Scope 7.6 Conclusion References

14 8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission 8.1 Introduction 8.2 Review of Literature 8.3 Methodology Used 8.4 Results and Discussion 8.5 Conclusions References

15 9 Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) 9.1 Introduction 9.2 Overview of 5G 9.3 Key Enabling Techniques for 5G 9.4 5G Green Network 9.5 5G Technologies: Security and Privacy Issues 9.6 5G-GN Assets and Threats 9.7 5G-GN Security Strategies and Deployments 9.8 Risk Analysis of 5G Applications 9.9 Countermeasures Against Security and Privacy Risks 9.10 Protecting 5G Green Networks Against Attacks 9.11 Future Challenges 9.12 Conclusion References

16 10 A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology 10.1 Introduction 10.2 Literature Survey 10.3 Problem Statement 10.4 Green it Using Virtualization 10.5 Proposed Work 10.6 Conclusion Acknowledgments References

17 11 Big Data Architecture for Network Security 11.1 Introduction to Big Data 11.2 Technology Used to Big Data 11.3 Working Process of Techniques 11.4 Proposed Work 11.5 Comparative Analysis 11.6 Conclusion and Future Scope References

18 About the Editors

19 Index

20 Also of Interest

21 End User License Agreement

List of Tables

1 Chapter 1 Table 1.1 Libraries and their versions

2 Chapter 2 Table 2.1 Systems needs of cloud forensic tool implementation Table 2.2 Data transfer calculations Table 2.3 Evidences usage in testing processing Table 2.4 Outputs of one node/one cluster. Table 2.5 Outputs of workstation clusters Table 2.6 Outputs of high-performance clusters Table 2.7 Outputs based on virtualization cluster

3 Chapter 5Table 5.1 Comparison of various blockchain architecturesTable 5.2 Overview of various blockchain-based identity management system.

4 Chapter 7Table 7.1 Popular privacy preservation schemes pertaining to CPS.Table 7.2 Age ranges of cancer patients based on dataset obtained from Kaggle wi...Table 7.3 Results of privacy loss for different ε values used in minimization of...

5 Chapter 8Table 8.1(A) Suggested algorithm at sender side.Table 8.1(B) Suggested algorithm at receiver side.Table 8.2 Values for PSNR at decomposition level = 16.Table 8.3 Values for PSNR at decomposition level = 4.

6 Chapter 9Table 9.1 Threats and assets toward 5G green network (5G-GN).

7 Chapter 10Table 10.1 Server name and type with application details.Table 10.2 Server type with available hardware.Table 10.3 Server type with utilization.Table 10.4 Server type with operating system and application.Table 10.5 Return of investment (ROI) in power and cooling.Table 10.6 Return of investment (ROI) in data center space.Table 10.7 Return of investment (ROI) in network.Table 10.8 Return of investment (ROI) in storage (*considered zero due to previo...

8 Chapter 11Table 11.1 Big data types based on the level of processing.Table 11.2 Comparison of time taken in different cases.Table 11.3 Comparison of error rate in different cases.Table 11.4 Comparison of packet size in different cases.Table 11.5 Comparison of security mechanism in different cases.

List of Illustrations

1 Chapter 1 Figure 1.1 Proposed system design architecture. Figure 1.2 Home or my profile page from manager’s point of view. Figure 1.3 Home or my dashboard page from employee point of view. Figure 1.4 Inbox page from manager’s point of view. Figure 1.5 Flowchart of inbox. Figure 1.6 Storage bucket from manager’s point of view. Figure 1.7 Flowchart of storage bucket. Figure 1.8 Manage employees page from manager point of view. Figure 1.9 Flowchart of employee database. Figure 1.10 Announcement page from manager point of view. Figure 1.11 Flowchart of creating announcement. Figure 1.12 Group access control modifier by manager. Figure 1.13 Before compression of data (raw data). Figure 1.14 After compression of data (compressed data).

2 Chapter 3Figure 3.1 Linux.Figure 3.2 Linux.Figure 3.3 GUI hashing tool for windows: hash tool.Figure 3.4 Linux terminal.Figure 3.5 PE-bear.Figure 3.6 Snipped image of the result produced by dumpbin (Windows).Figure 3.7 Dependencies (Windows only).Figure 3.8 Virtualbox network port configuration.Figure 3.9 Guest addition.Figure 3.10 VBoxService.exe file.Figure 3.11 Process Monitor (Windows only).Figure 3.12 Process explorer (Windows).Figure 3.13 AccessEnum (Windows).Figure 3.14 Wireshark display structure (Windows/Linux).Figure 3.15 Flowchart.Figure 3.16 PEiD tool (Windows only).Figure 3.17 Portable executable dissected.Figure 3.18 Ghidra (Windows and Linux).Figure 3.19 WinDbg (Windows only).

3 Chapter 4Figure 4.1 Block diagram of block-chain secured online shopping.Figure 4.2 Traditional supply chain mechanism.Figure 4.3 Supply chain using blockchain technology.

4 Chapter 5Figure 5.1 Identity management system architecture.Figure 5.2 Blockchain architecture.Figure 5.3 Merkle tree [Source: Cointral.com].

5 Chapter 6Figure 6.1 An example of extraction of image feature in convolution neural netwo...Figure 6.2 Training model with MINST database.Figure 6.3 (a) Fully connected RNN and (b) simple, partially connected RNN.Figure 6.4 Abstraction and the detailed process of recurrent neural network.Figure 6.5 Process of RNN forward propagation.Figure 6.6 Basic LSTM structure for RNN.Figure 6.7 Back propagation in neural networks.Figure 6.8 Basic architecture for generative steganography using neural networks...Figure 6.9 Illustration of gradient descent optimization technique in neural net...Figure 6.10 Differential process of (a) stochastic gradient descent and (b) grad...Figure 6.11 Convergence techniques in SGD with momentum.

6 Chapter 7Figure 7.1 Minimization of privacy loss using barrier function.Figure 7.2 Illustrative mechanism for smart health management system.Figure 7.3 Portion of cancer patients’ dataset used in our study.Figure 7.4 Comparative performance between most promising privacy preservation m...

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cyber Security and Network Security»

Представляем Вашему вниманию похожие книги на «Cyber Security and Network Security» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cyber Security and Network Security»

Обсуждение, отзывы о книге «Cyber Security and Network Security» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x