000 03932cam a22006258i 4500
001 9781003218555
003 FlBoTFG
005 20240213122833.0
006 m o d
007 cr |||||||||||
008 220529s2023 flu ob 001 0 eng
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781003218555
_q(ebook)
020 _a1003218555
020 _a9781000645880
_q(electronic bk. : PDF)
020 _a1000645886
_q(electronic bk. : PDF)
020 _a9781000645910
_q(electronic bk. : EPUB)
020 _a1000645916
_q(electronic bk. : EPUB)
020 _z9781032111285
_q(hardback)
020 _z9781032329796
_q(paperback)
024 7 _a10.1201/9781003218555
_2doi
035 _a(OCoLC)1334007708
035 _a(OCoLC-P)1334007708
050 0 0 _aQA76.9.A25
072 7 _aCOM
_x059000
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aUB
_2bicssc
082 0 0 _a005.8
_223/eng/20220630
245 0 0 _aCyber security threats and challenges facing human life /
_ceditedby Narendra M. Shekokar, Hari Vasudevan, Surya Durbha, Antonis Michalas, Tatwadarshi P. Nagarhalli, Ramchandra Mangrulkar, Monika Mangla.
250 _aFirst edition.
264 1 _aBoca Raton :
_bChapman & Hall/CRC Press,
_c2023.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aCyber security challenges in digital manufacturing and possible ways of mitigation -- An efficient proxy signature based authority delegation scheme for medical cyber physical system -- The impact of COVID-19 pandemic on cybersecurity issues of healthcare domain : a scoping review -- Cyber threats : a fear over industries -- A comprehensive survey of existing security techniques in IoT protocol stack -- Impact of cyber security threats on IoT applications -- Need of Internet of Things (IoT) forensics : case studies and analysis -- A comparative analysis of tree based algorithms and application of XGBoost classifier in malware detection -- An assessment on game-based cyber defense strategy for SDN -- Smart computing -- cyber threats and mitigation techniques -- SQL injection attacks on Indian websites : a case study -- Information security systems and its future -- Different similarity measures for secure name matching in record linkage.
520 _a"Cyber Security Threats and Challenges: A Comprehensive Coverage proposes to provide a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain with a detailed analysis of effective countermeasures and mitigations. The financial sector, Healthcare, digital manufacturing and social media are some of the important areas where cyber-attacks are frequent and cause great harm. Hence, special emphasis will be given to study and analyze the cyber security challenges and countermeasures in these three important areas, apart from other sectors"--
_cProvided by publisher.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer crimes
_xPrevention.
650 7 _aCOMPUTERS / Computer Engineering
_2bisacsh
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Internet / Security
_2bisacsh
700 1 _aShekokar, Narendra M.,
_eeditor.
700 1 _aVasudevan, Hari
_c(Engineer),
_eeditor.
700 1 _aDurbha, Surya Srinivas,
_eeditor.
700 1 _aMichalas, Antonis,
_eeditor.
700 1 _aNagarhalli, Tatwadarshi P.,
_eeditor.
700 1 _aMangrulkar, Ramchandra,
_eeditor.
700 1 _aMangla, Monika,
_eeditor.
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003218555
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
999 _c6085
_d6085