FinUniversity Electronic Library

     

Details

Cyber security and threats: concepts, methodologies, tools, and applications / Information Resources Management Association, editor. — 1 online resource — <URL:http://elib.fa.ru/ebsco/1741780.pdf>.

Record create date: 3/29/2018

Subject: Internet — Security measures.; Computer crimes — Prevention.; COMPUTERS / Security / General.

Collections: EBSCO

Allowed Actions:

Action 'Read' will be available if you login or access site from another network Action 'Download' will be available if you login or access site from another network

Group: Anonymous

Network: Internet

Annotation

"This book contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography"--.

Document access rights

Network User group Action
Finuniversity Local Network All Read Print Download
Internet Readers Read Print
-> Internet Anonymous

Table of Contents

  • Title Page
  • Copyright Page
  • Editorial Advisory Board
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Fundamental Concepts and Theories
    • Chapter 1: Role of Cyber Security in Today's Scenario
    • Chapter 2: Reconceptualising Cyber Security
    • Chapter 3: A Comprehensive Study of Security in Cloud Computing
    • Chapter 4: Security Aspects in Cloud Computing
    • Chapter 5: Cloud Security Issues and Challenges
    • Chapter 6: Cloud Security Engineering Concept and Vision
    • Chapter 7: Security and Compliance
    • Chapter 8: Economics of Cyber Security and the Way Forward
    • Chapter 9: Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat
    • Chapter 10: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
    • Chapter 11: A Survey
    • Chapter 12: A Need for Cyber Security Creativity
  • Section 2: Development and Design Methodologies
    • Chapter 13: Cyber Attacks and Preliminary Steps in Cyber Security in National Protection
    • Chapter 14: Assessing Security With Regard to Cloud Applications in STEM Education
    • Chapter 15: Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences
    • Chapter 16: Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    • Chapter 17: The Development of Cybersecurity Policy and Legislative Landscape in Latin America and Caribbean States
    • Chapter 18: Cooperation and Free Riding in Cyber Security Information-Sharing Programs
    • Chapter 19: Good Governance and Virtue in South Africa's Cyber Security Policy Implementation
    • Chapter 20: Configuring a Trusted Cloud Service Model for Smart City Exploration Using Hybrid Intelligence
    • Chapter 21: Visual Cryptography for Securing Images in Cloud
    • Chapter 22: Security Issues in Distributed Computing System Models
    • Chapter 23: Migration Goals and Risk Management in Cloud Computing
    • Chapter 24: The Rigorous Security Risk Management Model
    • Chapter 25: Controlled Intelligent Agents' Security Model for Multi-Tenant Cloud Computing Infrastructures
    • Chapter 26: Security Challenges for Cloud Computing Development Framework in Saudi Arabia
    • Chapter 27: Mobile Cloud Computing Security Frameworks
    • Chapter 28: Towards a Model of Social Media Impacts on Cybersecurity Knowledge Transfer
    • Chapter 29: Exploring Information Security Governance in Cloud Computing Organisation
    • Chapter 30: Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
    • Chapter 31: Big Data Security Framework for Distributed Cloud Data Centers
    • Chapter 32: Cyber Terrorism Taxonomies
    • Chapter 33: CYRAN
    • Chapter 34: TVGuarder
    • Chapter 35: A Conceptual Security Framework for Cloud Computing Issues
  • Section 3: Tools and Technologies
    • Chapter 36: Flow-Graph and Markovian Methods for Cyber Security Analysis
    • Chapter 37: DNA Cryptography
    • Chapter 38: Security Architecture for Cloud Computing
    • Chapter 39: Applications of Digital Signature Certificates for Online Information Security
    • Chapter 40: Web Services Gateway
    • Chapter 41: Quantum Cryptography
    • Chapter 42: A Novel Ammonic Conversion Algorithm for Securing Data in DNA Using Parabolic Encryption
    • Chapter 43: Monitoring and Auditing in the Cloud
    • Chapter 44: Secure Key Establishment in Wireless Sensor Networks
  • Section 4: Utilization and Applications
    • Chapter 45: Secure Architecture for Cloud Environment
    • Chapter 46: Security Problems in Cloud Computing Environments
    • Chapter 47: Cyber Security Centres for Threat Detection and Mitigation
    • Chapter 48: Arts and Branches of Science Significantly Contributing to Cyber and Cyber Security
    • Chapter 49: Cyber-Security Concerns With Cloud Computing
    • Chapter 50: Security Management in Mobile Cloud Computing
    • Chapter 51: Identifying and Analyzing the Latent Cyber Threats in Developing Economies
    • Chapter 52: Cyber Space Security Assessment Case Study
    • Chapter 53: Navigating Through Choppy Waters of PCI DSS Compliance
    • Chapter 54: Israel's Cyber Security Policy
    • Chapter 55: Pragmatic Solutions to Cyber Security Threat in Indian Context
    • Chapter 56: Chaotic Map for Securing Digital Content
    • Chapter 57: SCIPS
  • Section 5: Organizational and Social Implications
    • Chapter 58: Cyber Threats in Civil Aviation
    • Chapter 59: Cyber Security and Business Growth
    • Chapter 60: Security Issues Related to Cloud Applications in STEM Education
    • Chapter 61: Cyber Security Risks in Robotics
    • Chapter 62: Security and Trust in Cloud Computing
    • Chapter 63: Recent Developments in Cryptography
    • Chapter 64: Cybersecurity and Data Breaches at Schools
    • Chapter 65: Managing Risk in Cloud Computing
    • Chapter 66: Cloud Crime and Fraud
  • Section 6: Critical Issues and Challenges
    • Chapter 67: Legal Issues
    • Chapter 68: Cloud Storage Privacy and Security User Awareness
    • Chapter 69: Analysis of Cyber-Attacks Against the Transportation Sector
    • Chapter 70: Can Total Quality Management Exist in Cyber Security
    • Chapter 71: Mitigating Unconventional Cyber-Warfare
    • Chapter 72: Proposals to Win the Battle Against Cyber Crime
    • Chapter 73: Cyber-Security Intelligence Gathering
    • Chapter 74: A Comparative Study on DNA-Based Cryptosystem
    • Chapter 75: Security of the Cloud
    • Chapter 76: International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict
  • Section 7: Emerging Trends
    • Chapter 77: Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare
    • Chapter 78: Exploring Cyber Security Vulnerabilities in the Age of IoT
    • Chapter 79: Recent Trends in Cloud Computing Security Issues and Their Mitigation
    • Chapter 80: The Need for a National Data Breach Notification Law
    • Chapter 81: Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing
    • Chapter 82: Trends in Peace Research
  • Index

Usage statistics

stat Access count: 0
Last 30 days: 0
Detailed usage statistics