Card | Table | RUSMARC | |
Cyber security and threats: concepts, methodologies, tools, and applications / Information Resources Management Association, editor. — 1 online resource — <URL:http://elib.fa.ru/ebsco/1741780.pdf>.Record create date: 3/29/2018 Subject: Internet — Security measures.; Computer crimes — Prevention.; COMPUTERS / Security / General. Collections: EBSCO Allowed Actions: –
Action 'Read' will be available if you login or access site from another network
Action 'Download' will be available if you login or access site from another network
Group: Anonymous Network: Internet |
Annotation
"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"--.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All | |||||
Internet | Readers | |||||
Internet | Anonymous |
Table of Contents
- Title Page
- Copyright Page
- Editorial Advisory Board
- List of Contributors
- Table of Contents
- Preface
- Section 1: Fundamental Concepts and Theories
- Chapter 1: Role of Cyber Security in Today's Scenario
- Chapter 2: Reconceptualising Cyber Security
- Chapter 3: A Comprehensive Study of Security in Cloud Computing
- Chapter 4: Security Aspects in Cloud Computing
- Chapter 5: Cloud Security Issues and Challenges
- Chapter 6: Cloud Security Engineering Concept and Vision
- Chapter 7: Security and Compliance
- Chapter 8: Economics of Cyber Security and the Way Forward
- Chapter 9: Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat
- Chapter 10: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
- Chapter 11: A Survey
- Chapter 12: A Need for Cyber Security Creativity
- Section 2: Development and Design Methodologies
- Chapter 13: Cyber Attacks and Preliminary Steps in Cyber Security in National Protection
- Chapter 14: Assessing Security With Regard to Cloud Applications in STEM Education
- Chapter 15: Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences
- Chapter 16: Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
- Chapter 17: The Development of Cybersecurity Policy and Legislative Landscape in Latin America and Caribbean States
- Chapter 18: Cooperation and Free Riding in Cyber Security Information-Sharing Programs
- Chapter 19: Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
- Chapter 20: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
- Chapter 21: Visual Cryptography for Securing Images in Cloud
- Chapter 22: Security Issues in Distributed Computing System Models
- Chapter 23: Migration Goals and Risk Management in Cloud Computing
- Chapter 24: The Rigorous Security Risk Management Model
- Chapter 25: Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures
- Chapter 26: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
- Chapter 27: Mobile Cloud Computing Security Frameworks
- Chapter 28: Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer
- Chapter 29: Exploring Information Security Governance in Cloud Computing Organisation
- Chapter 30: Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
- Chapter 31: Big Data Security Framework for Distributed Cloud Data Centers
- Chapter 32: Cyber Terrorism Taxonomies
- Chapter 33: CYRAN
- Chapter 34: TVGuarder
- Chapter 35: A Conceptual Security Framework for Cloud Computing Issues
- Section 3: Tools and Technologies
- Chapter 36: Flow-Graph and Markovian Methods for Cyber Security Analysis
- Chapter 37: DNA Cryptography
- Chapter 38: Security Architecture for Cloud Computing
- Chapter 39: Applications of Digital Signature Certificates for Online Information Security
- Chapter 40: Web Services Gateway
- Chapter 41: Quantum Cryptography
- Chapter 42: A Novel Ammonic Conversion Algorithm for Securing Data in DNA Using Parabolic Encryption
- Chapter 43: Monitoring and Auditing in the Cloud
- Chapter 44: Secure Key Establishment in Wireless Sensor Networks
- Section 4: Utilization and Applications
- Chapter 45: Secure Architecture for Cloud Environment
- Chapter 46: Security Problems in Cloud Computing Environments
- Chapter 47: Cyber Security Centres for Threat Detection and Mitigation
- Chapter 48: Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security
- Chapter 49: Cyber-Security Concerns With Cloud Computing
- Chapter 50: Security Management in Mobile Cloud Computing
- Chapter 51: Identifying and Analyzing the Latent Cyber Threats in Developing Economies
- Chapter 52: Cyber Space Security Assessment Case Study
- Chapter 53: Navigating Through Choppy Waters of PCI DSS Compliance
- Chapter 54: Israel's Cyber Security Policy
- Chapter 55: Pragmatic Solutions to Cyber Security Threat in Indian Context
- Chapter 56: Chaotic Map for Securing Digital Content
- Chapter 57: SCIPS
- Section 5: Organizational and Social Implications
- Chapter 58: Cyber Threats in Civil Aviation
- Chapter 59: Cyber Security and Business Growth
- Chapter 60: Security Issues Related to Cloud Applications in STEM Education
- Chapter 61: Cyber Security Risks in Robotics
- Chapter 62: Security and Trust in Cloud Computing
- Chapter 63: Recent Developments in Cryptography
- Chapter 64: Cybersecurity and Data Breaches at Schools
- Chapter 65: Managing Risk in Cloud Computing
- Chapter 66: Cloud Crime and Fraud
- Section 6: Critical Issues and Challenges
- Chapter 67: Legal Issues
- Chapter 68: Cloud Storage Privacy and Security User Awareness
- Chapter 69: Analysis of Cyber-Attacks Against the Transportation Sector
- Chapter 70: Can Total Quality Management Exist in Cyber Security
- Chapter 71: Mitigating Unconventional Cyber-Warfare
- Chapter 72: Proposals to Win the Battle Against Cyber Crime
- Chapter 73: Cyber-Security Intelligence Gathering
- Chapter 74: A Comparative Study on DNA-Based Cryptosystem
- Chapter 75: Security of the Cloud
- Chapter 76: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict
- Section 7: Emerging Trends
- Chapter 77: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare
- Chapter 78: Exploring Cyber Security Vulnerabilities in the Age of IoT
- Chapter 79: Recent Trends in Cloud Computing Security Issues and Their Mitigation
- Chapter 80: The Need for a National Data Breach Notification Law
- Chapter 81: Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing
- Chapter 82: Trends in Peace Research
- Index
Usage statistics
Access count: 0
Last 30 days: 0 Detailed usage statistics |