Description |
1 online resource (xxii, 478 pages) : illustrations |
Contents |
1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M.B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Reséndez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar |
Summary |
In today's age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks an |
Notes |
"An Auerbach book." |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
|
Print version record |
Subject |
Computer security -- Case studies
|
|
Computer networks -- Security measures -- Case studies
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer networks -- Security measures
|
|
Computer security
|
Genre/Form |
Case studies
|
Form |
Electronic book
|
Author |
Issac, Biju, editor, author
|
|
Israr, Nauman, editor
|
LC no. |
2014009581 |
ISBN |
9781482207071 |
|
1482207079 |
|
9781322636788 |
|
1322636788 |
|
0429090668 |
|
9780429090660 |
|
1138034134 |
|
9781138034136 |
|