Cyber Security and Network Security

  • 4h 36m
  • Abhijit Guha, Debabrata Samanta, M. Vinay, Sabyasachi Pramanik
  • John Wiley & Sons (US)
  • 2022

CYBER SECURITY AND NETWORK SECURITY

Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.

Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.

This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

About the Author

Sabyasachi Pramanik is an assistant professor in the Department of Computer Science and Engineering, Haldia Institute of Technology, India. After earned his PhD in computer science and engineering from the Sri Satya Sai University of Technology and Medical Sciences, Bhopal, India.. He has more than 50 publications in various scientific and technical conferences, journals, and online book chapter contributions. He is also serving as the editorial board member on many scholarly journals and has authored one book. He is an editor of various books from a number of publishers, including Scrivener Publishing.

Debabrata Samanta, PhD, is an assistant professor in the Department of Computer Science, CHRIST (Deemed to be University), Bangalore, India. He obtained his PhD in from the National Institute of Technology, Durgapur, India, and he is the owner of 20 patents and two copyrights. He has authored or coauthored over 166 research papers in international journals and conferences and has received the “Scholastic Award” at the Second International Conference on Computer Science and IT application in Delhi, India. He is a co-author of 11 books and the co-editor of 7 books and has presented various papers at international conferences and received Best Paper awards. He has authored o co-authored 20 Book Chapters.

M. Vinay, PhD, obtained his PhD at JJT University Rajasthan for Computer Science and is an assistant professor of computer science at CHRIST (Deemed to be University) Bengaluru, India. With over 14 years of teaching, he has received numerous prestigious teaching awards. He has given more than 30 invited talks, 35 guests lectures and conducted more than 25 workshops, He has also published over a dozen papers in distinguished scholarly journals.

Abhijit Guha is pursuing a doctorate with the Department of Data Science, CHRIST (Deemed to be University), India. He is currently working as a research and development scientist with First American India Private Ltd. He received three consecutive “Innovation of the Year” awards, from 2015 to 2017, by First American India for his contribution towards his research.

In this Book

  • Preface
  • Securing Cloud-Based Enterprise Applications and Its Data
  • High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review
  • Malware Identification, Analysis and Similarity
  • Robust Fraud Detection Mechanism
  • Blockchain-Based Identity Management Systems
  • Insights Into Deep Steganography—A Study of Steganography Automation and Trends
  • Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System
  • Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission
  • Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN)
  • A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology
  • Big Data Architecture for Network Security
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE