000 | 05012cam a2200505 i 4500 | ||
---|---|---|---|
001 | on1292744255 | ||
003 | OCoLC | ||
005 | 20240523125543.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 220120s2022 nju ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dOCLCF _dOCLCO _dYDX _dOCLCQ _dUPM _dOCLCQ _dWSU _dOCLCO _dOCLCL _dOCLCQ |
||
020 |
_a9781119795667 _q(electronic bk. : oBook) |
||
020 |
_a1119795664 _q(electronic bk. : oBook) |
||
024 | 7 |
_a10.1002/9781119795667 _2doi |
|
029 | 1 |
_aAU@ _b000070667753 |
|
035 | _a(OCoLC)1292744255 | ||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aCyber security and digital forensics / _cedited by Mangesh M. Ghonge [and more]. |
264 | 1 |
_aHoboken, NJ : _bWiley ; _aBeverly, MA : _bScrivener Publishing, _c2022. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aAdvances in cyber security | |
505 | 0 | _aA Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture / Ankur O Bang, Udai Pratap Rao, Amit A Bhusari -- Quantum and Post-Quantum Cryptography / Om Pal, Manoj Jain, BK Murthy, Vinay Thakur -- Artificial Neural Network Applications in Analysis of Forensic Science / KR Padma, KR Don -- A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications / Rashmi Salavi, M M Math, U P Kulkarni -- Understanding Robotics through Synthetic Psychology / Garima Saini, Shabnam -- An Insight into Digital Forensics: History, Frameworks, Types and Tools / G Maria Jones, S Godfrey Winster -- Digital Forensics as a Service: Analysis for Forensic Knowledge / Soumi Banerjee, Anita Patil, Dipti Jadhav, Gautam Borkar -- 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework / Neel A Patel, Dhairya A Parekh, Yash A Shah, Ramchandra Mangrulkar -- Ensuring Secure Data Sharing in IoT Domains Using Blockchain / Tawseef Ahmed Teli, Rameez Yousuf, Dawood Ashraf Khan -- A Review of Face Analysis Techniques for Conventional and Forensic Applications / HT Chethana, Trisiladevi C Nagavi -- Roadmap of Digital Forensics Investigation Process with Discovery of Tools / Anita Patil, Soumi Banerjee, Dipti Jadhav, Gautam Borkar -- Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach / Kaushik Dushyant, Garg Muskan, Annu, Ankur Gupta, Sabyasachi Pramanik -- Applications of Machine Learning Techniques in the Realm of Cybersecurity / Koushal Kumar, Bhagwati Prasad Pande -- Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Blockchain at Dark Web Platform / Anand Singh Rajawat, Romil Rawat, Kanishk Barhanpurkar -- Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications / Tun Myat Aung, Ni Ni Hla -- Ransomware: Threats, Identification and Prevention / Sweta Thakur, Sangita Chaudhari, Bharti Joshi. | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aOnline resource; title from PDF title page (John Wiley, viewed January 20, 2022). | |
520 | _aCurrent cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 | _aDigital forensic science. | |
650 | 2 | _aComputer Security | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aDigital forensic science _2fast |
|
700 | 1 |
_aGhonge, Mangesh, _d1984- _eeditor. |
|
758 |
_ihas work: _aCyber security and digital forensics (Text) _1https://id.oclc.org/worldcat/entity/E39PCFv4FQQVPGDXjYbVKFHxj3 _4https://id.oclc.org/worldcat/ontology/hasWork |
||
830 | 0 | _aAdvances in cyber security. | |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119795667 |
938 |
_aYBP Library Services _bYANK _n302666478 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12860 _d12860 |