Cyber security standards, practices and industrial applications systems and methodologies için kapak resmi
Cyber security standards, practices and industrial applications systems and methodologies
Başlık:
Cyber security standards, practices and industrial applications systems and methodologies
ISBN:
9781609608521
Yayın Bilgileri:
Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), c2012.
Fiziksel Tanımlama:
electronic texts (279 p.) : ill., digital files.
Contents:
1. Securing wireless ad hoc networks: state of the art and challenges / Victor Pomponiu -- 2. Smartphone data protection using mobile usage pattern matching / Wen-Chen Hu ... [et al.] -- 3. Conservation of mobile data and usability constraints / Rania Mokhtar and Rashid Saeed -- 4. Cyber security and privacy in the age of social networks / Babar Bhatti -- 5. Botnets and cyber security: battling online threats / Ahmed Mansour Manasrah ... [et al.] -- 6. Evaluation of contemporary anomaly detection systems (ADSs) / Ayesha Binte Ashfaq and Syed Ali Khayam -- 7. Practical quantum key distribution / Sellami Ali -- 8. Automated formal methods for security protocol engineering / Alfredo Pironti, Davide Pozza and Riccardo Sisto -- 9. Fault tolerant remote terminal units (RTUs) in SCADA systems / Syed Misbahuddin and Nizar Al-Holou -- 10. Embedded systems security / Muhammad Farooq-i-Azam and Muhammad Naeem Ayyaz -- 11. Cyber security in liquid petroleum pipelines / Morgan Henrie -- 12. Application of cyber security in emerging C4ISR systems / Ashfaq Ahmad Malik ... [et al.] -- 13. Practical Web application security audit following industry standards and compliance / Shakeel Ali.
Abstract:
"This book details the latest and most important advances in security standards, introducing the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance)"--Provided by publisher.
Ek Kurum Yazarı:

Dil:
English