Versatile Cybersecurity

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Versatile Cybersecurity by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319976433
Publisher: Springer International Publishing Publication: October 17, 2018
Imprint: Springer Language: English
Author:
ISBN: 9783319976433
Publisher: Springer International Publishing
Publication: October 17, 2018
Imprint: Springer
Language: English

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap.

 This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing  the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide,  which address important attacks from theoretical (modeling) as well as practical aspects.

 Each chapter brings  together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks.

 This book will serve the interests of  cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap.

 This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing  the placement of defense solutions to combat the attacks. It includes eight high quality chapters from established security research groups worldwide,  which address important attacks from theoretical (modeling) as well as practical aspects.

 Each chapter brings  together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks.

 This book will serve the interests of  cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. 

More books from Springer International Publishing

Cover of the book Intelligent Computations: Abstract Fractional Calculus, Inequalities, Approximations by
Cover of the book Enforcing Privacy by
Cover of the book Seeing Cities Through Big Data by
Cover of the book The Boundary-Scan Handbook by
Cover of the book High Calorie Diet and the Human Brain by
Cover of the book Riding the Leadership Rollercoaster by
Cover of the book Trust in Nuclear Disarmament Verification by
Cover of the book Hardware and Software: Verification and Testing by
Cover of the book Simulation Approach Towards Energy Flexible Manufacturing Systems by
Cover of the book Computer Safety, Reliability, and Security by
Cover of the book The Hydraulic Transport and Storage of Extractive Waste by
Cover of the book Inequality and Organizational Practice by
Cover of the book Advances on P2P, Parallel, Grid, Cloud and Internet Computing by
Cover of the book Cognitive Theory and Documentary Film by
Cover of the book Life Cycle and Sustainability of Abrasive Tools by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy