Breadcrumbs Section. Click here to navigate to respective pages.
Book

Book
Handbook of e-Business Security
DOI link for Handbook of e-Business Security
Handbook of e-Business Security book
Handbook of e-Business Security
DOI link for Handbook of e-Business Security
Handbook of e-Business Security book
Edited ByJoão Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari
Edition 1st Edition
First Published 2018
eBook Published 2 August 2018
Pub. Location New York
Imprint Auerbach Publications
Pages 422
eBook ISBN 9780429468254
Subjects CRC/IHC Default Subject Code, Computer Science
Share
Get Citation
Tavares, J.M.R.S., Mishra, B.K., Kumar, R., Zaman, N., & Khari, M. (Eds.). (2018). Handbook of e-Business Security (1st ed.). Auerbach Publications. https://doi.org/10.1201/9780429468254
ABSTRACT
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
TABLE OF CONTENTS
chapter 2|19 pages
Understanding the Aspect of Cryptography and Internet Security: A Practical Approach
ByAnjana Mishra, Sukant Kishoro Bisoy
chapter 3|22 pages
Attainment of Cybersecurity Using Support Vector Machine Involving Data Mining Techniques
BySoobia Saeed, M. Alam
chapter 5|35 pages
Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review
ByKshira Sagar Sahoo, Ranjan Kumar Behera, Bibhudatta Sahoo, Mayank Tiwary
chapter 6|29 pages
Fog Computing in Internet of Things-Based E-Health System—Challenges and Opportunities for Managing Health-Associated Data
ByMirjana Maksimovic
chapter 7|24 pages
Security Issues in Distributed Computation for Big Data Analytics
ByRanjan Kumar Behera, Kshira Sagar Sahoo, Sambit Mahapatra, Santanu Kumar Rath, Bibudatta Sahoo
chapter 9|18 pages
Big Data and Behavior Analytics in Marketing
ByArchana Singh, Jayanthi Ranjan, Mamta Mittal
chapter 10|16 pages
Recent Trends in the Era of Cybercrime and the Measures to Control Them
ByPooja Kamat, Apurv Singh Gautam
chapter 11|26 pages
Electronic Wastage: Prospects and Challenges for the Next Generation
BySudan Jha, Le Hoang Son, Raghvendra Kumar, Manju Khari, Jyotirmoy Chatterjee
chapter 12|28 pages
Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems
ByUnny R Balakrishnan, Gaurav Mishra, Nityesh Bhatt
chapter 13|27 pages
Internet of Things (IoT) Deployment in Wearable Healthcare: A Sociotechno Evaluation
ByGaurav Mishra, Balakrishnan Unny, Nityesh Bhatt
chapter 14|23 pages
IoT-Based Privacy Control System through Android
ByRavika Gupta, Gulshan Shrivastava, Rohit Anand, Tina Tomažič
chapter 15|20 pages
Digital Signature and Its Pivotal Role in Affording Security Services
BySushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra