This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

chapter 1|21 pages

Context-Aware Systems: Protecting Sensitive Information and Controlling Network Behavior

ByAlberto Huertas Celdrán, Manuel Gil Pérez, Félix J. García Clemente, Gregorio Martínez Pérez

chapter 3|49 pages

Forecasting Problems in Cybersecurity: Applying Econometric Techniques to Measure IT Risk

ByBaidyanath Biswas, Sukanya Patra

chapter 5|32 pages

A Systematic Review of Attack Graph Generation and Analysis Techniques

ByUrvashi Garg, Geeta Sikka, Lalit K. Awasthi

chapter 6|24 pages

Biometric-Based Authentication in Cloud Computing

ByPoonam Saini, Awadhesh Kumar Singh

chapter 7|23 pages

Analysis of Various Trust Computation Methods: A Step toward Secure FANETs

ByKuldeep Singh, Anil Kumar Verma, Palvi Aggarwal

chapter 8|28 pages

Security in Wireless LAN (WLAN) and WiMAX Systems

ByShashank Gupta, Brij B. Gupta

chapter 9|26 pages

Botnet Behavior and Detection Techniques: A Review

ByAmmar Almomani, Osama M. Dorgham, Mohammad Alauthman, Mohammed Al-Refai, Nauman Aslam

chapter 10|31 pages

Overview of Smartphone Security: Attack and Defense Techniques

ByDiksha Goel, Ankit Kumar Jain

chapter 12|29 pages

Medical Image Enhancement Techniques: A Survey

BySonali Maharajan, Satya Prakash Ghrera, Amit Kumar Singh, Sima Sahu

chapter 13|20 pages

Extraction of Malware IOCs and TTPs Mapping with CoAs

ByShiza Hassan, Masoom Alam, Tanveer Khan, Nadeem Javaid, Abid Khan

chapter 14|34 pages

Implementing a Secure Web-Based Application Using Microsoft SDL

BySwapnoneel Roy, Pavan S. Mudundi

chapter 15|36 pages

Preserving Privacy for Trust-Based Unwanted Traffic Control with Homomorphic Encryption

ByLifang Zhang, Zheng Yan, Raimo Kantola

chapter 16|30 pages

DOM-Guard: Defeating DOM-Based Injection of XSS Worms in HTML5 Web Applications on Mobile-Based Cloud Platforms

ByBrij B. Gupta, Himanshu Soni, Pankaj Siwan, Ankit Kumar, Shashank Gupta

chapter 17|24 pages

Secure and Fault-Tolerant Computing in Mobile Ad Hoc Networks

ByParmeet Kaur, Awadhesh Kumar Singh

chapter 18|29 pages

Applications of Digital Signatures in Cryptography

BySarvesh Tanwar, Anil Kumar Verma

chapter 19|17 pages

Credit Scoring Using Birds Swarm Optimization

ByDamodar Reddy Edla, G Pedunayak, K Tejaswini, K Hareesh, Ramalingaswamy Cheruku

chapter 22|16 pages

Security Issues and Challenges in Online Social Networks (OSNs) Based on User Perspective

BySomya Ranjan Sahoo, Brij B. Gupta

chapter 23|20 pages

A Compendium of Security Issues in Wireless Sensor Networks

ByJasminder Kaur Sandhu, Anil Kumar Verma, Prashant Singh Rana

chapter 24|22 pages

Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime

ByAnupama Mishra, Brij B. Gupta, Deepak Gupta