|
Books > Computing & IT > Computer communications & networking
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
Vehicular networks were first developed to ensure safe driving and
to extend the Internet to the road. However, we can now see that
the ability of vehicles to engage in cyber-activity may result in
tracking and privacy violations through the interception of
messages, which are frequently exchanged on road. This book serves
as a guide for students, developers and researchers who are
interested in vehicular networks and the associated security and
privacy issues. It facilitates the understanding of the
technologies used and their various types, highlighting the
importance of privacy and security issues and the direct impact
they have on the safety of their users. It also explains various
solutions and proposals to protect location and identity privacy,
including two anonymous authentication methods that preserve
identity privacy and a total of five schemes that preserve location
privacy in the vehicular ad hoc networks and the cloud-enabled
internet of vehicles, respectively.
Smart Cities Cybersecurity and Privacy examines the latest research
developments and their outcomes for safe, secure, and trusting
smart cities residents. Smart cities improve the quality of life of
citizens in their energy and water usage, healthcare, environmental
impact, transportation needs, and many other critical city
services. Recent advances in hardware and software, have fueled the
rapid growth and deployment of ubiquitous connectivity between a
city's physical and cyber components. This connectivity however
also opens up many security vulnerabilities that must be mitigated.
Smart Cities Cybersecurity and Privacy helps researchers,
engineers, and city planners develop adaptive, robust, scalable,
and reliable security and privacy smart city applications that can
mitigate the negative implications associated with cyber-attacks
and potential privacy invasion. It provides insights into
networking and security architectures, designs, and models for the
secure operation of smart city applications.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
Data is the most important commodity, which is why data protection
has become a global priority. Data breaches and security flaws can
jeopardize the global economy. Organizations face a greater risk of
failing to achieve strategy and business goals as cyber threat
behavior grows in frequency, sophistication, and destructiveness. A
breach can result in data loss, business interruption, brand and
reputation harm, as well as regulatory and legal consequences. A
company needs a well-thought-out cybersecurity strategy to secure
its critical infrastructure and information systems in order to
overcome these challenges. Cross-Industry Applications of Cyber
Security Frameworks provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program. It is equipped with cross-industry
applications of cybersecurity frameworks, best practices for common
practices, and suggestions that may be highly relevant or
appropriate in every case. Covering topics such as legal
frameworks, cybersecurity in FinTech, and open banking, this
premier reference source is an essential resource for executives,
business leaders, managers, entrepreneurs, IT professionals,
government officials, hospital administrators, educational
administrators, privacy specialists, researchers, and academicians.
Harden your business against internal and external cybersecurity
threats with a single accessible resource. In 8 Steps to Better
Security: A Simple Cyber Resilience Guide for Business,
cybersecurity researcher and writer Kim Crawley delivers a grounded
and practical roadmap to cyber resilience in any organization.
Offering you the lessons she learned while working for major tech
companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and
Venafi, Crawley condenses the essence of business cybersecurity
into eight steps. Written to be accessible to non-technical
businesspeople as well as security professionals, and with insights
from other security industry leaders, this important book will walk
you through how to: Foster a strong security culture that extends
from the custodial team to the C-suite Build an effective security
team, regardless of the size or nature of your business Comply with
regulatory requirements, including general data privacy rules and
industry-specific legislation Test your cybersecurity, including
third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople,
and managers at any level, 8 Steps to Better Security is also a
must-have resource for companies of all sizes, and in all
industries.
Computational Intelligence for Multimedia Big Data on the Cloud
with Engineering Applications covers timely topics, including the
neural network (NN), particle swarm optimization (PSO),
evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS),
etc. Furthermore, the book highlights recent research on
representative techniques to elaborate how a data-centric system
formed a powerful platform for the processing of cloud hosted
multimedia big data and how it could be analyzed, processed and
characterized by CI. The book also provides a view on how
techniques in CI can offer solutions in modeling, relationship
pattern recognition, clustering and other problems in
bioengineering. It is written for domain experts and developers who
want to understand and explore the application of computational
intelligence aspects (opportunities and challenges) for design and
development of a data-centric system in the context of multimedia
cloud, big data era and its related applications, such as smarter
healthcare, homeland security, traffic control trading analysis and
telecom, etc. Researchers and PhD students exploring the
significance of data centric systems in the next paradigm of
computing will find this book extremely useful.
In the world of mathematics and computer science, technological
advancements are constantly being researched and applied to ongoing
issues. Setbacks in social networking, engineering, and automation
are themes that affect everyday life, and researchers have been
looking for new techniques in which to solve these challenges.
Graph theory is a widely studied topic that is now being applied to
real-life problems. Advanced Applications of Graph Theory in Modern
Society is an essential reference source that discusses recent
developments on graph theory, as well as its representation in
social networks, artificial neural networks, and many complex
networks. The book aims to study results that are useful in the
fields of robotics and machine learning and will examine different
engineering issues that are closely related to fuzzy graph theory.
Featuring research on topics such as artificial neural systems and
robotics, this book is ideally designed for mathematicians,
research scholars, practitioners, professionals, engineers, and
students seeking an innovative overview of graphic theory.
Steganography is the art of secret writing. The purpose of
steganography is to hide the presence of a message from the
intruder by using state-of-the-art methods, algorithms,
architectures, models, and methodologies in the domains of cloud,
internet of things (IoT), and the Android platform. Though security
controls in cloud computing, IoT, and Android platforms are not
much different than security controls in an IT environment, they
might still present different types of risks to an organization
than the classic IT solutions. Therefore, a detailed discussion is
needed in case there is a breach in security. It is important to
review the security aspects of cloud, IoT, and Android platforms
related to steganography to determine how this new technology is
being utilized and improved continuously to protect information
digitally. The benefits and challenges, along with the current and
potential developments for the future, are important keystones in
this critical area of security research. Multidisciplinary Approach
to Modern Digital Steganography reviews the security aspects of
cloud, IoT, and Android platforms related to steganography and
addresses emerging security concerns, new algorithms, and case
studies in the field. Furthermore, the book presents a new approach
to secure data storage on cloud infrastructure and IoT along with
including discussions on optimization models and security controls
that could be implemented. Other important topics include data
transmission, deep learning techniques, machine learning, and both
image and text stenography. This book is essential for forensic
engineers, forensic analysts, cybersecurity analysts, cyber
forensic examiners, security engineers, cybersecurity network
analysts, cyber network defense analysts, and digital forensic
examiners along with practitioners, researchers, academicians, and
students interested in the latest techniques and state-of-the-art
methods in digital steganography.
This bestselling on-the-job reference and test preparation guide
has been fully revised for new 2022 exam objectives This fully
revised and updated resource offers complete coverage of the latest
release of CompTIA A+ exams 220-1101 & 220-1102. You'll find
learning objectives at the beginning of each chapter, exam tips,
practice exam questions, and in-depth explanations. Designed to
help you pass the CompTIA A+ exams with ease, this definitive guide
also serves as an essential on-the-job IT reference. Covers all
exam topics, including how to: Work with CPUs, RAM, BIOS,
motherboards, power supplies, and other personal computer
components Install, configure, and maintain hard drives Manage
input devices and removable media Set up, upgrade, and maintain
Microsoft Windows Troubleshoot and fix computer problems Install
printers and other peripherals Configure and secure mobile devices
>Connect to the Internet Set up wired and wireless networks
Protect your personal computer and your network Implement
virtualization and cloud-based technologies Online content
includes: Practice exams for 1101 & 1102 with hundreds of
questions One hour of video training from Mike Meyers TotalSim
simulations of performance-based questions A collection of Mike
Meyers' favorite shareware and freeware PC tools and utilities
As society continues to heavily rely on software and databases, the
risks for cyberattacks have increased rapidly. As the dependence on
computers has become gradually widespread throughout communities
and governments, there is a need for cybersecurity programs that
can assist in protecting sizeable networks and significant amounts
of data at once. Implementing overarching security policies for
software systems is integral to protecting community-wide data from
harmful attacks. Establishing Cyber Security Programs Through the
Community Cyber Security Maturity Model (CCSMM) is an essential
reference source that discusses methods in applying sustainable
cybersecurity programs and policies within organizations,
governments, and other communities. Featuring research on topics
such as community engagement, incident planning methods, and
information sharing, this book is ideally designed for
cybersecurity professionals, security analysts, managers,
researchers, policymakers, students, practitioners, and
academicians seeking coverage on novel policies and programs in
cybersecurity implementation.
Now that there's software in everything, how can you make anything
secure? Understand how to engineer dependable systems with this
newly updated classic In Security Engineering: A Guide to Building
Dependable Distributed Systems, Third Edition Cambridge University
professor Ross Anderson updates his classic textbook and teaches
readers how to design, implement, and test systems to withstand
both error and attack. This book became a best-seller in 2001 and
helped establish the discipline of security engineering. By the
second edition in 2008, underground dark markets had let the bad
guys specialize and scale up; attacks were increasingly on users
rather than on technology. The book repeated its success by showing
how security engineers can focus on usability. Now the third
edition brings it up to date for 2020. As people now go online from
phones more than laptops, most servers are in the cloud, online
advertising drives the Internet and social networks have taken over
much human interaction, many patterns of crime and abuse are the
same, but the methods have evolved. Ross Anderson explores what
security engineering means in 2020, including: How the basic
elements of cryptography, protocols, and access control translate
to the new world of phones, cloud services, social media and the
Internet of Things Who the attackers are - from nation states and
business competitors through criminal gangs to stalkers and
playground bullies What they do - from phishing and carding through
SIM swapping and software exploits to DDoS and fake news Security
psychology, from privacy through ease-of-use to deception The
economics of security and dependability - why companies build
vulnerable systems and governments look the other way How dozens of
industries went online - well or badly How to manage security and
safety engineering in a world of agile development - from
reliability engineering to DevSecOps The third edition of Security
Engineering ends with a grand challenge: sustainable security. As
we build ever more software and connectivity into safety-critical
durable goods like cars and medical devices, how do we design
systems we can maintain and defend for decades? Or will everything
in the world need monthly software upgrades, and become unsafe once
they stop?
The rapid growth of the Internet interconnectivity and complexity
of communication systems has led us to a significant growth of
cyberattacks globally often with severe and disastrous
consequences. The swift development of more innovative and
effective (cyber)security solutions and approaches are vital which
can detect, mitigate and prevent from these serious consequences.
Cybersecurity is gaining momentum and is scaling up in very many
areas. This book builds on the experience of the Cyber-Trust EU
project's methods, use cases, technology development, testing and
validation and extends into a broader science, lead IT industry
market and applied research with practical cases. It offers new
perspectives on advanced (cyber) security innovation (eco) systems
covering key different perspectives. The book provides insights on
new security technologies and methods for advanced cyber threat
intelligence, detection and mitigation. We cover topics such as
cyber-security and AI, cyber-threat intelligence, digital
forensics, moving target defense, intrusion detection systems,
post-quantum security, privacy and data protection, security
visualization, smart contracts security, software security,
blockchain, security architectures, system and data integrity,
trust management systems, distributed systems security, dynamic
risk management, privacy and ethics.
|
|