NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Cyber security in parallel and distributed computing : (Record no. 12588)

MARC details
000 -LEADER
fixed length control field 13640cam a2200949 i 4500
001 - CONTROL NUMBER
control field on1084633746
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125541.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190204s2019 nju ob 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2019005079
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
Modifying agency OCLCF
-- DG1
-- N$T
-- YDX
-- EBLCP
-- UKMGB
-- UKAHL
-- COO
-- DLC
-- OCLCO
-- OCL
-- K6U
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
-- SFB
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB930661
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 019252790
Source Uk
019 ## -
-- 1090728134
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119488323
Qualifying information (Adobe PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111948832X
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119488316
Qualifying information (ePub)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119488311
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119488057
Qualifying information (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119488330
Qualifying information (electronic book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119488338
Qualifying information (electronic book)
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 019252790
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 565571877
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 001048788
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000065218938
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000067383219
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000070479980
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1084633746
Canceled/invalid control number (OCoLC)1090728134
037 ## - SOURCE OF ACQUISITION
Stock number 9781119488316
Source of stock number/acquisition Wiley
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 10 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
245 00 - TITLE STATEMENT
Title Cyber security in parallel and distributed computing :
Remainder of title concepts, techniques, applications and case studies /
Statement of responsibility, etc. edited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Scrivener Publishing/Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note "John Wiley & Sons Inc."--title page verso.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record and CIP data provided by publisher.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as \Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? -- 5.4 Conclusion -- References -- Part 2 Cybersecurity in Parallel and Distributed Computing Techniques -- 6 Introduction to Blockchain Technology -- 6.1 Introduction -- 6.2 Need for Blockchain Security -- 6.3 Characteristics of Blockchain Technology -- 6.4 Types of Blockchains -- 6.5 The Architecture of Blockchain Technology -- 6.6 How Blockchain Technology Works -- 6.7 Some Other Case Studies for Blockchain Technology.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.8 Challenges Faced by Blockchain Technology -- 6.9 The Future of Blockchain Technology -- 6.10 Conclusion -- References -- 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations -- 7.1 Introduction -- 7.1.1 Primary Characteristics of a Distributed System -- 7.1.2 Major Challenges for Distributed Systems -- 7.2 Identifying Cyber Requirements -- 7.3 Popular security mechanisms in Distributed Systems -- 7.3.1 Secure Communication -- 7.3.1.1 Authentication -- 7.3.1.2 Shared Keys Authorship-Based Authentication -- 7.3.1.3 Key Distribution Center-Based Authentication -- 7.3.1.4 Public key encryption based authentication -- 7.3.2 Message Integrity and Confidentiality -- 7.3.2.1 Digital Signatures -- 7.3.2.2 Session Keys -- 7.3.3 Access Controls -- 7.3.3.1 Access Control Matrix -- 7.3.3.2 Protection Domains -- 7.3.3.3 Trusted Code -- 7.3.3.4 Denial of Service -- 7.4 Service Level Agreements -- 7.4.1 Types of SLAs -- 7.4.2 Critical Areas for SLAs -- 7.4.2.1 Examining the Network -- 7.4.2.2 Forensics -- 7.4.2.3 Managing Records/Documents -- 7.4.2.4 Backing Up Data -- 7.5 The Cuckoo's Egg in the Context of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants -- 7.6.1.1 Particularity -- 7.6.1.2 Reasonable Time Period for Examining Seized Electronic Equipment -- 7.6.1.3 Irrational Retention of Seized Data -- 7.6.2 Searching and Seizing -- 7.7 Conclusion -- References -- 8 Distributed Computing Security: Issues and Challenges -- 8.1 Introduction -- 8.2 Security Issues and Challenges -- 8.2.1 Confidentiality, Integrity and Availability -- 8.2.2 Authentication and Access Control Issue -- 8.2.3 Broken Authentication, Session and Access -- 8.3 Security Issues and Challenges in Advanced Areas -- 8.4 Conclusion -- References.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 9 Organization Assignment in Federated Cloud Environments based onMulti-Target Optimization of Security -- 9.1 Introduction -- 9.2 Background Work Related to Domain -- 9.2.1 Basics on Cloud computing -- 9.2.2 Clouds Which are Federated -- 9.2.3 Cloud Resource Management -- 9.3 Architectural-Based Cloud Security Implementation -- 9.4 Expected Results of the Process -- 9.5 Conclusion -- References -- 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee -- 10.1 Introduction -- 10.1.1 Key Research Problems in This Area -- 10.1.2 Problems with Interoperability -- 10.2 Difficulties from a Cloud Adoption Perspective -- 10.3 Security and Privacy -- 10.3.1 Resource Provisioning -- 10.3.1.1 Unwavering Quality -- 10.3.1.2 Interoperability -- 10.3.2 How Do We Define Cloud? -- 10.3.3 Public vs Private Cloud-Based Services -- 10.3.3.1 Cloud Services -- 10.3.3.2 Cloud Services vs Web Services -- 10.3.3.3 Efficient Monitoring for Provisioning CDC Resources -- 10.3.3.4 Optimal VM Placement and Migration in CDC for Energy-Efficient Resource Provisioning -- 10.3.3.5 Appropriate Locating of CDCs and Allocation of CDCs to the Source of Requests -- 10.3.3.6 Clustering Distributed CDCs for Faster Server Provisioning -- 10.3.3.7 Uniform Task of Customers to CDC Servers -- 10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers -- 10.3.4.1 Graph Theory Applications in Computer Networks -- 10.3.4.2 Graph Theory Applications in Cloud Computing -- 10.4 Conclusion and Future Work -- References -- Part 3 Cybersecurity Applications and Case Studies -- 11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection -- 11.1 Introduction -- 11.1.1 What is Cybercrime? -- 11.1.2 What is Cybersecurity? -- 11.1.3 Purpose of This Cybersecurity Pilot Study.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 11.1.4 Methods of Cybersecurity Professionals -- 11.2 Shocking Statistics of Cybercrime -- 11.2.1 Role of the Internet Crime Complaint Center -- 11.2.2 2016 Global Economic Crime Survey Report -- 11.2.3 Inadequate Preparation at Organizations -- 11.2.4 Organizations: Be Aware, Be Secure -- 11.3 Cybersecurity Policies for Organizations -- 11.3.1 Classification of Cybersecurity at an Organization -- 11.3.2 Pyramid of Cybersecurity -- 11.4 Blockchain Technology -- 11.5 Research Methodology -- 11.5.1 Quantitative and Qualitative Data Collection -- 11.5.2 Design of the Study -- 11.5.3 Selection of the Delphi Method -- 11.5.4 Procedure of Utilization of the Delphi Method -- 11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study -- 11.6 Results of the Cybersecurity Delphi Study -- 11.6.1 Results from Round One -- 11.6.1.1 Expert Level Awareness of Cybersecurity -- 11.6.1.2 Cyber Incident Response Plan -- 11.6.1.3 Federal Government Cybersecurity Initiatives -- 11.6.1.4 Blockchain Secure Internet Transactions -- 11.6.2 Results of Round Two -- 11.6.3 Discussion and Limitations Based on the Results -- 11.7 Conclusion -- 11.7.1 The Literature in the Field -- 11.7.2 Next Steps for Future Research -- References -- 12 Smartphone Triggered Security Challenges -- Issues, Case Studies and Prevention -- 12.1 Introduction -- 12.2 Classification of Mobile Security Threats -- 12.2.1 Physical Threats -- 12.2.2 Web-Based Threats -- 12.2.3 Application-Based Threats -- 12.2.4 Network-Based Threats -- 12.2.5 Data Transfer-Based Threats -- 12.2.6 Improper Session Management-Based Threats -- 12.2.7 Bluetooth-Based Threats -- 12.2.8 Application Platform-Based Threats -- 12.3 Smartphones as a Tool of Crime -- 12.4 Types of Mobile Phone-Related Crimes -- 12.5 Types of Mobile Fraud -- 12.6 Case Studies -- 12.6.1 Mobile Identity Theft -- 12.6.2 Data Theft by Applications.
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Parallel processing (Electronic computers)
Form subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Distributed processing
-- Security measures.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element R�eseaux d'ordinateurs
General subdivision S�ecurit�e
-- Mesures.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Traitement r�eparti
General subdivision S�ecurit�e
-- Mesures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Parallel processing (Electronic computers)
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic data processing
General subdivision Distributed processing
-- Security measures
Source of heading or term fast
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Le, Dac-Nhuong,
Dates associated with a name 1983-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Raghvendra,
Dates associated with a name 1987-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mishra, Brojo Kishore,
Dates associated with a name 1979-
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Khari, Manju,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chatterjee, Jyotir Moy,
Relator term editor.
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Cyber security in parallel and distributed computing (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCGP9KBWD8cvctvkyCQTktC
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Title Cyber security in parallel and distributed computing
Edition First edition.
Place, publisher, and date of publication Hoboken, NJ : John Wiley & Sons, Inc. : Scrivener Publishing LLC, [2019]
International Standard Book Number 9781119488057
Record control number (DLC) 2019003709
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330</a>
938 ## -
-- YBP Library Services
-- YANK
-- 16137535
938 ## -
-- YBP Library Services
-- YANK
-- 16129614
938 ## -
-- YBP Library Services
-- YANK
-- 16142902
938 ## -
-- EBSCOhost
-- EBSC
-- 2091370
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL5741215
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH35878820
994 ## -
-- 92
-- INLUM

No items available.