Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019)
Loot Price: R4,921
Discovery Miles 49 210
|
|
Handbook of Big Data and IoT Security (Hardcover, 1st ed. 2019)
Expected to ship within 12 - 17 working days
|
This handbook provides an overarching view of cyber security and
digital forensic challenges related to big data and IoT
environment, prior to reviewing existing data mining solutions and
their potential application in big data context, and existing
authentication and access control for IoT devices. An IoT access
control scheme and an IoT forensic framework is also presented in
this book, and it explains how the IoT forensic framework can be
used to guide investigation of a popular cloud storage service. A
distributed file system forensic approach is also presented, which
is used to guide the investigation of Ceph. Minecraft, a Massively
Multiplayer Online Game, and the Hadoop distributed file system
environment are also forensically studied and their findings
reported in this book. A forensic IoT source camera identification
algorithm is introduced, which uses the camera's sensor pattern
noise from the captured image. In addition to the IoT access
control and forensic frameworks, this handbook covers a cyber
defense triage process for nine advanced persistent threat (APT)
groups targeting IoT infrastructure, namely: APT1, Molerats, Silent
Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens,
Volatile Cedar and Transparent Tribe. The characteristics of
remote-controlled real-world Trojans using the Cyber Kill Chain are
also examined. It introduces a method to leverage different crashes
discovered from two fuzzing approaches, which can be used to
enhance the effectiveness of fuzzers. Cloud computing is also often
associated with IoT and big data (e.g., cloud-enabled IoT systems),
and hence a survey of the cloud security literature and a survey of
botnet detection approaches are presented in the book. Finally,
game security solutions are studied and explained how one may
circumvent such solutions. This handbook targets the security,
privacy and forensics research community, and big data research
community, including policy makers and government agencies, public
and private organizations policy makers. Undergraduate and
postgraduate students enrolled in cyber security and forensic
programs will also find this handbook useful as a reference.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.