Books+ Search Results

Advances in Cyber Security Analytics and Decision Systems

Title
Advances in Cyber Security Analytics and Decision Systems [electronic resource] / edited by Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar.
ISBN
9783030193539
Edition
1st ed. 2020.
Publication
Cham : Springer International Publishing : Imprint: Springer, 2020.
Physical Description
1 online resource (XII, 145 p.) 42 illus., 36 illus. in color.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others. Focuses on current theory, research, and results on cyber security and analytics Presents a variety of practical applications of cyber security measures Chapters written by global cyber security experts.
Variant and related titles
Springer ENIN.
Other formats
Printed edition:
Printed edition:
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
January 16, 2020
Series
EAI/Springer innovations in communication and computing.
EAI/Springer Innovations in Communication and Computing,
Contents
Chapter 1. Introduction
Chapter 2. Security Design
Chapter 3. Authentication
Chapter 4. Authorization
Chapter 5. Cryptography
Chapter 6. Virtualization
Chapter 7. Security principles
Chapter 8. Malware
Chapter 9. SQL Injection
Chapter 10. DoS
Chapter 11. Worms
Chapter 12. Virus
Chapter 13. Malicious Code
Chapter 14. Intrusion Detection Systems
Chapter 15. Vulnerability
Chapter 16. Cyber Laws
Chapter 17. Cyber Crime
Chapter 18. Homeland Security
Chapter 19. Cryptocurrency
Chapter 20. BitCoin
Chapter 21. Block chain
Chapter 22. Phishing
Chapter 23. Spoofing
Chapter 24. Cyber War
Chapter 25. Hacktivism
Chapter 26. Distributed Denial of Service (DDoS)
Chapter 27. Identity Fraud
Chapter 28. Honeypot
Chapter 29. Keylogging
Chapter 30. Scareware
Chapter 31. Spam
Chapter 32. Sponsored Attacks
Chapter 33. Sneakernet
Chapter 34. Virtual Militray Technologies
Chapter 35. Zero Day
Chapter 36. Intrusion prevention system (IPS)
Chapter 37. Macro virus
Chapter 38. Wannacry
Chapter 39. Conclusion.
Also listed under
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?