• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Handbook of computer networks and cyber security

پدید آورنده
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.

موضوع
Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.

رده
TK5105
.
5

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3030222772
(Number (ISBN
9783030222772
Erroneous ISBN
3030222764
Erroneous ISBN
9783030222765

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Handbook of computer networks and cyber security
General Material Designation
[Book]
Other Title Information
principles and paradigms /
First Statement of Responsibility
Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Cham :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
2020.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (957 p.)

GENERAL NOTES

Text of Note
6.2 Authentication Service
Text of Note
Description based upon print version of record.

CONTENTS NOTE

Text of Note
Intro -- Preface -- Acknowledgment -- Contents -- About the Editors -- 1 Security Frameworks in Mobile Cloud Computing -- 1 Introduction -- 2 Architecture of Mobile Cloud Computing -- 3 Security Aspects of Mobile Cloud Computing -- 4 Security Frameworks for Mobile Cloud Computing -- 4.1 Authentication Frameworks for Mobile Cloud Computing -- 4.2 Privacy Preserving Security Frameworks for MCC -- 4.3 Secure Data Storage Frameworks for MCC -- 4.4 Security Frameworks for Computation Using MCC -- 5 Attack, Risk Assessment, and Verifiability in Mobile Clouds -- 6 Summary and Discussion
Text of Note
2.2 Mean Failure Cost Model (MFC): A Quantitative Cybersecurity Risk Assessment Model -- 2.3 Mean Failure Cost (MFC) Limits -- 3 Cloud Computing Environments -- 3.1 Cloud Computing Architecture -- 3.2 Cloud Computing Security Issues -- 4 MFCext and MFCint: New Quantitative Security Risk Assessment Models -- 4.1 Security Threat Space Intrusion -- 4.1.1 Internal Threats -- 4.1.2 External Threats -- 4.1.3 Internal/External Threats -- 4.2 MFCext and MFCint: The Proposed Model -- 4.3 Illustration of the Cybersecurity Model: A Cloud Computing System -- 4.4 Validation of the MFCint and the MFCext
Text of Note
4.1 Smart-Model: System Architecture -- 4.2 Component Views -- 4.3 Flow of Information Management -- 5 Security Solutions for Smart Model -- 5.1 Model Description -- 5.2 Key Generation -- 5.2.1 Encryption to Top Cloud -- 5.2.2 Encryption to IS -- 5.2.3 Proxy Re-encryption -- 5.2.4 Signature Generation by Top Cloud -- 5.2.5 Signature Generation in Regional Cloud -- 5.2.6 Signature Generation by End-Users -- 6 Schemes for Secure Framework -- 6.1 Confidentiality -- 6.1.1 Encryption to Top Cloud -- 6.1.2 Encryption to Information Storage -- 6.1.3 Proxy Re-encryption to Information Storage
Text of Note
4.5 MFCext and MFCint Limits and Advantages -- 5 The MFC Extension Model (MFCE) -- 5.1 The MFCE Model -- 5.2 Illustration of the MFC Extension Model: Cloud Computing System -- 5.2.1 The Impact Threats Classes Matrix -- 5.2.2 The Threat Classes Matrix -- 5.3 Validation of the MFCE Model -- 6 Conclusion -- References -- 4 A Novel AckIBE-Based Secure Cloud Data Management Framework -- 1 Introduction -- 1.1 Support of Cloud Computing -- 2 Related Literature -- 2.1 Security Approaches of Smart Model -- 3 Basic IB Schemes -- 3.1 Other IB Schemes -- 4 Secure Smart Model
Text of Note
7 Conclusion -- References -- 2 An Investigation Study of Privacy Preserving in Cloud Computing Environment -- 1 Introduction -- 2 Privacy-Preserving Methods -- 3 Searchable Encryption-Based Techniques -- 3.1 Symmetric-Key Based Techniques -- 3.2 Fuzzy-Searchable Encryption -- 3.3 Public-Key Encryption -- 4 Conclusion and Future Work -- References -- 3 Towards New Quantitative Cybersecurity Risk Analysis Models for Information Systems: A Cloud ComputingCase Study -- 1 Introduction -- 2 Motivation: Quantitative Cybersecurity Risk Assessment Models -- 2.1 Related Work
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of storing and retrieving security-intensive information, requires placement of adequate security measures to safeguard the entire computing and communication scenario. With the advent of Internet and its underlying technologies, information security aspects are becoming a prime concern towards protecting the networks and the cyber ecosystem from variety of threats, which is illustrated in this handbook. This handbook primarily targets professionals in security, privacy and trust to use and improve the reliability of businesses in a distributed manner, as well as computer scientists and software developers, who are seeking to carry out research and develop software in information and cyber security. Researchers and advanced-level students in computer science will also benefit from this reference.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Springer Nature
Stock Number
com.springer.onix.9783030222772

OTHER EDITION IN ANOTHER MEDIUM

Title
Handbook of Computer Networks and Cyber Security : Principles and Paradigms
International Standard Book Number
9783030222765

TOPICAL NAME USED AS SUBJECT

Computer networks, Handbooks, manuals, etc.
Computer security, Handbooks, manuals, etc.
Computer networks.
Computer security.

DEWEY DECIMAL CLASSIFICATION

Number
004
.
6
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
5

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Agrawal, Dharma P., (Dharma Prakash),1945-
Gupta, Brij,1982-
Gupta, Deepak,1983-
Martinez Pérez, Gregorio.

ORIGINATING SOURCE

Date of Transaction
20200823092402.0

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival