Versatile Cybersecurity Versatile Cybersecurity
Advances in Information Security

Versatile Cybersecurity

Mauro Conti and Others
    • $149.99
    • $149.99

Publisher Description

Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates. A large number of advanced security books focus on either cryptography or system security which covers both information and network security. However, there is hardly any books available for advanced-level students and research scholars in security research to systematically study how the major attacks are studied, modeled, planned and combated by the community. This book aims to fill this gap.

 This book provides focused content related to specific attacks or attack families. These dedicated discussions in the form of individual chapters covers the application or area specific aspects, while discussing  the placement of defense solutions to combat the attacks. It includes eight high quality chaptersfrom established security research groups worldwide,  which address important attacks from theoretical (modeling) as well as practical aspects.

 Each chapter brings  together comprehensive and structured information on an attack or an attack family. The authors present crisp detailing on the state of the art with quality illustration of defense mechanisms and open research problems. This book also covers various important attacks families such as insider threats, semantics social engineering attacks, distributed denial of service attacks, botnet based attacks, cyber physical malware based attacks, cross-vm attacks, and IoT covert channel attacks.

 This book will serve the interests of  cyber security enthusiasts, undergraduates, post-graduates, researchers and professionals working in this field. 

GENRE
Computers & Internet
RELEASED
2018
October 17
LANGUAGE
EN
English
LENGTH
302
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
18.8
MB
An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
2011
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Cyber Security and Digital Forensics Cyber Security and Digital Forensics
2022
Security and Privacy in Communication Networks Security and Privacy in Communication Networks
2018
Applied Cryptography and Network Security Workshops Applied Cryptography and Network Security Workshops
2019
Security in Computing and Communications Security in Computing and Communications
2020
Cyber Threat Intelligence Cyber Threat Intelligence
2018
Blockchains Blockchains
2024
Computer Security – ESORICS 2023 Computer Security – ESORICS 2023
2024
Computer Security – ESORICS 2023 Computer Security – ESORICS 2023
2024
Computer Security – ESORICS 2023 Computer Security – ESORICS 2023
2024
Computer Security – ESORICS 2023 Computer Security – ESORICS 2023
2024
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007