Skip to main content
Taylor & Francis Group Logo
    Advanced Search

    Click here to search products using title name,author name and keywords.

    • Login
    • Hi, User  
      • Your Account
      • Logout
      Advanced Search

      Click here to search products using title name,author name and keywords.

      Breadcrumbs Section. Click here to navigate to respective pages.

      Book

      Computer and Cyber Security
      loading

      Book

      Computer and Cyber Security

      DOI link for Computer and Cyber Security

      Computer and Cyber Security book

      Principles, Algorithm, Applications, and Perspectives

      Computer and Cyber Security

      DOI link for Computer and Cyber Security

      Computer and Cyber Security book

      Principles, Algorithm, Applications, and Perspectives
      Edited ByBrij B. Gupta, Dharma P. Agrawal, Haoxiang Wang
      Edition 1st Edition
      First Published 2018
      eBook Published 30 November 2018
      Pub. Location New York
      Imprint Auerbach Publications
      DOI https://doi.org/10.1201/9780429424878
      Pages 694
      eBook ISBN 9780429424878
      Subjects CRC/IHC Default Subject Code, Computer Science
      Share
      Share

      Get Citation

      Agrawal, D.P., & Wang, H. (2018). Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives (B.B. Gupta, Ed.) (1st ed.). Auerbach Publications. https://doi.org/10.1201/9780429424878

      ABSTRACT

      This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

      TABLE OF CONTENTS

      chapter 1|21 pages

      Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior

      ByAlberto Huertas Celdrán, Manuel Gil Pérez, Félix J. García Clemente, Gregorio Martínez Pérez

      chapter 2|22 pages

      Critical Infrastructure Protection: Port Cybersecurity, Toward a Hybrid Port

      ByAndrea Chiappetta

      chapter 3|49 pages

      Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk

      ByBaidyanath Biswas, Sukanya Patra

      chapter 4|20 pages

      Cyberspace and Cybersecurity in the Digital Age: An Evolving Concern in Contemporary Security Discourse

      BySushma Devi, Mohd Aarif Rather

      chapter 5|32 pages

      A Systematic Review of Attack Graph Generation and Analysis Techniques

      ByUrvashi Garg, Geeta Sikka, Lalit K. Awasthi

      chapter 6|24 pages

      Biometric-Based Authentication in Cloud Computing

      ByPoonam Saini, Awadhesh Kumar Singh

      chapter 7|23 pages

      Analysis of Various Trust Computation Methods: A Step toward Secure FANETs

      ByKuldeep Singh, Anil Kumar Verma, Palvi Aggarwal

      chapter 8|28 pages

      Security in Wireless LAN (WLAN) and WiMAX Systems

      ByShashank Gupta, Brij B. Gupta

      chapter 9|26 pages

      Botnet Behavior and Detection Techniques: A Review

      ByAmmar Almomani, Osama M. Dorgham, Mohammad Alauthman, Mohammed Al-Refai, Nauman Aslam

      chapter 10|31 pages

      Overview of Smartphone Security: Attack and Defense Techniques

      ByDiksha Goel, Ankit Kumar Jain

      chapter 11|24 pages

      Cryptography for Addressing Cloud Computing Security, Privacy, and Trust Issues

      ByMustapha Hedabou

      chapter 12|29 pages

      Medical Image Enhancement Techniques: A Survey

      BySonali Maharajan, Satya Prakash Ghrera, Amit Kumar Singh, Sima Sahu

      chapter 13|20 pages

      Extraction of Malware IOCs and TTPs Mapping with CoAs

      ByShiza Hassan, Masoom Alam, Tanveer Khan, Nadeem Javaid, Abid Khan

      chapter 14|34 pages

      Implementing a Secure Web-Based Application Using Microsoft SDL

      BySwapnoneel Roy, Pavan S. Mudundi

      chapter 15|36 pages

      Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption

      ByLifang Zhang, Zheng Yan, Raimo Kantola

      chapter 16|30 pages

      DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms

      ByBrij B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta

      chapter 17|24 pages

      Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks

      ByParmeet Kaur, Awadhesh Kumar Singh

      chapter 18|29 pages

      Applications of Digital Signatures in Cryptography

      BySarvesh Tanwar, Anil Kumar Verma

      chapter 19|17 pages

      Credit Scoring Using Birds Swarm Optimization

      ByDamodar Reddy Edla, G Pedunayak, K Tejaswini, K Hareesh, Ramalingaswamy Cheruku

      chapter 20|29 pages

      A Review of Cryptographic Properties of 4-Bit S-Boxes with Generation and Analysis of Crypto Secure S-Boxes

      BySankhanil Dey, Ranjan Ghosh

      chapter 21|33 pages

      Role of Software-Defined Networking (SDN) in Internet of Things (IoT) Security: Attacks and Countermeasures

      ByMegha Quamara, Brij B. Gupta

      chapter 22|16 pages

      Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective

      BySomya Ranjan Sahoo, Brij B. Gupta

      chapter 23|20 pages

      A Compendium of Security Issues in Wireless Sensor Networks

      ByJasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana

      chapter 24|22 pages

      Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime

      ByAnupama Mishra, Brij B. Gupta, Deepak Gupta
      T&F logoTaylor & Francis Group logo
      • Policies
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
        • Privacy Policy
        • Terms & Conditions
        • Cookie Policy
      • Journals
        • Taylor & Francis Online
        • CogentOA
        • Taylor & Francis Online
        • CogentOA
      • Corporate
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
        • Taylor & Francis Group
      • Help & Contact
        • Students/Researchers
        • Librarians/Institutions
        • Students/Researchers
        • Librarians/Institutions
      • Connect with us

      Connect with us

      Registered in England & Wales No. 3099067
      5 Howick Place | London | SW1P 1WG © 2022 Informa UK Limited