000 13640cam a2200949 i 4500
001 on1084633746
003 OCoLC
005 20240523125541.0
006 m o d
007 cr |||||||||||
008 190204s2019 nju ob 001 0 eng
010 _a 2019005079
040 _aDLC
_beng
_erda
_cDLC
_dOCLCF
_dDG1
_dN$T
_dYDX
_dEBLCP
_dUKMGB
_dUKAHL
_dCOO
_dDLC
_dOCLCO
_dOCL
_dK6U
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dSFB
015 _aGBB930661
_2bnb
016 7 _a019252790
_2Uk
019 _a1090728134
020 _a9781119488323
_q(Adobe PDF)
020 _a111948832X
020 _a9781119488316
_q(ePub)
020 _a1119488311
020 _z9781119488057
_q(hardback)
020 _a9781119488330
_q(electronic book)
020 _a1119488338
_q(electronic book)
029 1 _aUKMGB
_b019252790
029 1 _aCHVBK
_b565571877
029 1 _aCHNEW
_b001048788
029 1 _aAU@
_b000065218938
029 1 _aAU@
_b000067383219
029 1 _aAU@
_b000070479980
035 _a(OCoLC)1084633746
_z(OCoLC)1090728134
037 _a9781119488316
_bWiley
042 _apcc
050 1 0 _aQA76.9.A25
072 7 _aCOM
_x053000
_2bisacsh
082 0 0 _a005.8
_223
049 _aMAIN
245 0 0 _aCyber security in parallel and distributed computing :
_bconcepts, techniques, applications and case studies /
_cedited by DacNhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Manju Khari, Jyotir Moy Chatterjee.
250 _aFirst edition.
264 1 _aHoboken, NJ :
_bScrivener Publishing/Wiley,
_c2019.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _a"John Wiley & Sons Inc."--title page verso.
504 _aIncludes bibliographical references and index.
520 _a"Covers privacy issue and challenges in data intensive cloud computing environment. Covers the concept of parallel and distributed computing technologies and their applications in real world settings. Offers data processing and security solutions Covers privacy issue and challenges in data intensive cloud computing environment. Includes the latest technologies that cover the major changes and advances of cyber security"--
_cProvided by publisher.
588 _aDescription based on print version record and CIP data provided by publisher.
505 0 _aCover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- List of Figures -- List of Tables -- Foreword -- Preface -- Acknowledgments -- Acronyms -- Part 1 Cybersecurity Concept -- 1 Introduction on Cybersecurity -- 1.1 Introduction to Cybersecurity -- 1.2 Cybersecurity Objectives -- 1.3 Cybersecurity Infrastructure and Internet Architecture (NIST) -- 1.4 Cybersecurity Roles -- 1.5 Cybercrimes -- 1.5.1 Overview -- 1.5.2 Traditional Computer Crime and Contemporary Computer Crime -- 1.5.3 Combating Crimes -- 1.5.3.1 Securing Networks -- 1.5.3.2 Incident Response Team -- 1.5.3.3 Detecting Malware -- 1.5.3.4 Authentication and Authorization -- 1.5.3.5 Filtering -- 1.5.3.6 Best Practices -- 1.6 Security Models -- 1.7 Computer Forensics -- 1.8 Cyber Insurance -- 1.8.1 Digital Citizenship -- 1.8.2 Information Warfare and Its Countermeasures -- 1.8.3 Network Neutrality -- 1.8.4 Good Practices and Policies -- 1.8.5 Cybersecurity and Human Rights -- 1.9 Future of Cybersecurity -- 1.10 Conclusion -- References -- 2 Steganography and Steganalysis -- 2.1 Introduction -- 2.2 Steganography -- 2.2.1 Method for Evaluating Hidden Information Schema Security -- 2.2.2 Peak Signal-to-Noise Ratio -- 2.3 Steganalysis -- 2.3.1 Blind Detection Based on LSB -- 2.3.1.1 Standard Deviation Analysis -- 2.3.1.2 Statistical Method X2 with a Degree of Freedom -- 2.3.1.3 Analyzing the Gray Ratio between Any Image and Image Set Up as \Landmark -- 2.3.1.4 Estimating Information Concealed in an Image -- 2.3.2 Constraint Steganalysis -- 2.3.2.1 HKC Hiding Technique -- 2.3.2.2 DIH Technique -- 2.3.2.3 IWH Hiding Technique -- 2.3.2.4 RVH Hiding Technique ( Hiding in Two Phases) -- 2.4 Conclusion -- References -- 3 Security Threats and Vulnerabilities in E-business -- 3.1 Introduction to e-Business -- 3.1.1 Benefits of e-Business -- 3.1.2 Business Revolution.
505 8 _a3.2 Security Issues in e-Business -- 3.2.1 Vulnerabilities -- 3.2.2 Security Attacks -- 3.2.3 Malware as a Threat -- 3.3 Common Vulnerabilities in e-Business -- 3.3.1 Phishing -- 3.3.2 Cross-Site Scripting (XSS) -- 3.4 Threats in e-Business -- 3.4.1 Ransomware -- 3.4.2 Spyware -- 3.4.3 Worms -- 3.4.4 Trojan Horse -- 3.5 Prevention Mechanism -- 3.6 Conclusion -- References -- 4 e-Commerce Security: Threats, Issues, andMethods -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 e-Commerce -- 4.3.1 Characteristics of e-Commerce Technology -- 4.3.2 Architectural Framework of e-Commerce -- 4.3.2.1 Two-Tier Architecture -- 4.3.2.2 Three-Tier Architecture -- 4.3.3 Advantages and Disadvantages of e-Commerce -- 4.4 Security Overview in e-Commerce -- 4.4.1 Purpose of Security in e-Commerce -- 4.4.2 Security Element at Different Levels of e-Commerce System -- 4.4.2.1 Hardware -- 4.4.2.2 Software -- 4.4.2.3 Environment -- 4.5 Security Issues in e-Commerce -- 4.5.1 Client Level -- 4.5.2 Front-End Servers and Software Application Level -- 4.5.3 Network and Server Level -- 4.6 Security Threats in e-Commerce -- 4.7 Security Approaches in e-Commerce -- 4.8 Comparative Analysis of Various Security Threats in e-Commerce -- 4.9 e-Commerce Security Life-Cycle Model -- 4.10 Conclusion -- References -- 5 Cyberwar is Coming -- 5.1 Introduction -- 5.2 Ransomware Attacks -- 5.2.1 Petya -- 5.2.2 WannaCry -- 5.2.3 Locky -- 5.3 Are Nations Ready? -- 5.4 Conclusion -- References -- Part 2 Cybersecurity in Parallel and Distributed Computing Techniques -- 6 Introduction to Blockchain Technology -- 6.1 Introduction -- 6.2 Need for Blockchain Security -- 6.3 Characteristics of Blockchain Technology -- 6.4 Types of Blockchains -- 6.5 The Architecture of Blockchain Technology -- 6.6 How Blockchain Technology Works -- 6.7 Some Other Case Studies for Blockchain Technology.
505 8 _a6.8 Challenges Faced by Blockchain Technology -- 6.9 The Future of Blockchain Technology -- 6.10 Conclusion -- References -- 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations -- 7.1 Introduction -- 7.1.1 Primary Characteristics of a Distributed System -- 7.1.2 Major Challenges for Distributed Systems -- 7.2 Identifying Cyber Requirements -- 7.3 Popular security mechanisms in Distributed Systems -- 7.3.1 Secure Communication -- 7.3.1.1 Authentication -- 7.3.1.2 Shared Keys Authorship-Based Authentication -- 7.3.1.3 Key Distribution Center-Based Authentication -- 7.3.1.4 Public key encryption based authentication -- 7.3.2 Message Integrity and Confidentiality -- 7.3.2.1 Digital Signatures -- 7.3.2.2 Session Keys -- 7.3.3 Access Controls -- 7.3.3.1 Access Control Matrix -- 7.3.3.2 Protection Domains -- 7.3.3.3 Trusted Code -- 7.3.3.4 Denial of Service -- 7.4 Service Level Agreements -- 7.4.1 Types of SLAs -- 7.4.2 Critical Areas for SLAs -- 7.4.2.1 Examining the Network -- 7.4.2.2 Forensics -- 7.4.2.3 Managing Records/Documents -- 7.4.2.4 Backing Up Data -- 7.5 The Cuckoo's Egg in the Context of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants -- 7.6.1.1 Particularity -- 7.6.1.2 Reasonable Time Period for Examining Seized Electronic Equipment -- 7.6.1.3 Irrational Retention of Seized Data -- 7.6.2 Searching and Seizing -- 7.7 Conclusion -- References -- 8 Distributed Computing Security: Issues and Challenges -- 8.1 Introduction -- 8.2 Security Issues and Challenges -- 8.2.1 Confidentiality, Integrity and Availability -- 8.2.2 Authentication and Access Control Issue -- 8.2.3 Broken Authentication, Session and Access -- 8.3 Security Issues and Challenges in Advanced Areas -- 8.4 Conclusion -- References.
505 8 _a9 Organization Assignment in Federated Cloud Environments based onMulti-Target Optimization of Security -- 9.1 Introduction -- 9.2 Background Work Related to Domain -- 9.2.1 Basics on Cloud computing -- 9.2.2 Clouds Which are Federated -- 9.2.3 Cloud Resource Management -- 9.3 Architectural-Based Cloud Security Implementation -- 9.4 Expected Results of the Process -- 9.5 Conclusion -- References -- 10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee -- 10.1 Introduction -- 10.1.1 Key Research Problems in This Area -- 10.1.2 Problems with Interoperability -- 10.2 Difficulties from a Cloud Adoption Perspective -- 10.3 Security and Privacy -- 10.3.1 Resource Provisioning -- 10.3.1.1 Unwavering Quality -- 10.3.1.2 Interoperability -- 10.3.2 How Do We Define Cloud? -- 10.3.3 Public vs Private Cloud-Based Services -- 10.3.3.1 Cloud Services -- 10.3.3.2 Cloud Services vs Web Services -- 10.3.3.3 Efficient Monitoring for Provisioning CDC Resources -- 10.3.3.4 Optimal VM Placement and Migration in CDC for Energy-Efficient Resource Provisioning -- 10.3.3.5 Appropriate Locating of CDCs and Allocation of CDCs to the Source of Requests -- 10.3.3.6 Clustering Distributed CDCs for Faster Server Provisioning -- 10.3.3.7 Uniform Task of Customers to CDC Servers -- 10.3.4 Traffic-Aware VM Migration to Load Balance Cloud Servers -- 10.3.4.1 Graph Theory Applications in Computer Networks -- 10.3.4.2 Graph Theory Applications in Cloud Computing -- 10.4 Conclusion and Future Work -- References -- Part 3 Cybersecurity Applications and Case Studies -- 11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection -- 11.1 Introduction -- 11.1.1 What is Cybercrime? -- 11.1.2 What is Cybersecurity? -- 11.1.3 Purpose of This Cybersecurity Pilot Study.
505 8 _a11.1.4 Methods of Cybersecurity Professionals -- 11.2 Shocking Statistics of Cybercrime -- 11.2.1 Role of the Internet Crime Complaint Center -- 11.2.2 2016 Global Economic Crime Survey Report -- 11.2.3 Inadequate Preparation at Organizations -- 11.2.4 Organizations: Be Aware, Be Secure -- 11.3 Cybersecurity Policies for Organizations -- 11.3.1 Classification of Cybersecurity at an Organization -- 11.3.2 Pyramid of Cybersecurity -- 11.4 Blockchain Technology -- 11.5 Research Methodology -- 11.5.1 Quantitative and Qualitative Data Collection -- 11.5.2 Design of the Study -- 11.5.3 Selection of the Delphi Method -- 11.5.4 Procedure of Utilization of the Delphi Method -- 11.5.5 Delphi Activities (Iteration Rounds) of This Pilot Study -- 11.6 Results of the Cybersecurity Delphi Study -- 11.6.1 Results from Round One -- 11.6.1.1 Expert Level Awareness of Cybersecurity -- 11.6.1.2 Cyber Incident Response Plan -- 11.6.1.3 Federal Government Cybersecurity Initiatives -- 11.6.1.4 Blockchain Secure Internet Transactions -- 11.6.2 Results of Round Two -- 11.6.3 Discussion and Limitations Based on the Results -- 11.7 Conclusion -- 11.7.1 The Literature in the Field -- 11.7.2 Next Steps for Future Research -- References -- 12 Smartphone Triggered Security Challenges -- Issues, Case Studies and Prevention -- 12.1 Introduction -- 12.2 Classification of Mobile Security Threats -- 12.2.1 Physical Threats -- 12.2.2 Web-Based Threats -- 12.2.3 Application-Based Threats -- 12.2.4 Network-Based Threats -- 12.2.5 Data Transfer-Based Threats -- 12.2.6 Improper Session Management-Based Threats -- 12.2.7 Bluetooth-Based Threats -- 12.2.8 Application Platform-Based Threats -- 12.3 Smartphones as a Tool of Crime -- 12.4 Types of Mobile Phone-Related Crimes -- 12.5 Types of Mobile Fraud -- 12.6 Case Studies -- 12.6.1 Mobile Identity Theft -- 12.6.2 Data Theft by Applications.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aParallel processing (Electronic computers)
_vSecurity measures.
650 0 _aElectronic data processing
_xDistributed processing
_xSecurity measures.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 6 _aTraitement r�eparti
_xS�ecurit�e
_xMesures.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aParallel processing (Electronic computers)
_2fast
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
650 7 _aElectronic data processing
_xDistributed processing
_xSecurity measures
_2fast
700 1 _aLe, Dac-Nhuong,
_d1983-
_eeditor.
700 1 _aKumar, Raghvendra,
_d1987-
_eeditor.
700 1 _aMishra, Brojo Kishore,
_d1979-
_eeditor.
700 1 _aKhari, Manju,
_eeditor.
700 1 _aChatterjee, Jyotir Moy,
_eeditor.
758 _ihas work:
_aCyber security in parallel and distributed computing (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGP9KBWD8cvctvkyCQTktC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_tCyber security in parallel and distributed computing
_bFirst edition.
_dHoboken, NJ : John Wiley & Sons, Inc. : Scrivener Publishing LLC, [2019]
_z9781119488057
_w(DLC) 2019003709
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119488330
938 _aYBP Library Services
_bYANK
_n16137535
938 _aYBP Library Services
_bYANK
_n16129614
938 _aYBP Library Services
_bYANK
_n16142902
938 _aEBSCOhost
_bEBSC
_n2091370
938 _aProQuest Ebook Central
_bEBLB
_nEBL5741215
938 _aAskews and Holts Library Services
_bASKH
_nAH35878820
994 _a92
_bINLUM
999 _c12588
_d12588