語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber Security: Issues and Current Trends
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Cyber Security: Issues and Current Trends/ by Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop.
作者:
Dutta, Nitul.
其他作者:
Pricop, Emil.
面頁冊數:
XIII, 174 p. 131 illus., 100 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/978-981-16-6597-4
ISBN:
9789811665974
Cyber Security: Issues and Current Trends
Dutta, Nitul.
Cyber Security: Issues and Current Trends
[electronic resource] /by Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop. - 1st ed. 2022. - XIII, 174 p. 131 illus., 100 illus. in color.online resource. - Studies in Computational Intelligence,9951860-9503 ;. - Studies in Computational Intelligence,564.
Chapter 1. Introduction to Cybersecurity -- Chapter 2. Being Hidden and Anonymous -- Chapter 3. TOR – The Onion Router -- Chapter 4. DarkNet and Hidden Services -- Chapter 5. Introduction to Digital Forensics -- Chapter 6. Intrusion Detection Systems fundamentals -- Chapter 7. Introduction to Malware Analysis -- Chapter 8. Design of a Virtual Cybersecurity Lab -- .Chapter 9. Importance of Cyber Law.
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
ISBN: 9789811665974
Standard No.: 10.1007/978-981-16-6597-4doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: Q342
Dewey Class. No.: 006.3
Cyber Security: Issues and Current Trends
LDR
:03878nam a22004095i 4500
001
1090422
003
DE-He213
005
20220501130316.0
007
cr nn 008mamaa
008
221228s2022 si | s |||| 0|eng d
020
$a
9789811665974
$9
978-981-16-6597-4
024
7
$a
10.1007/978-981-16-6597-4
$2
doi
035
$a
978-981-16-6597-4
050
4
$a
Q342
072
7
$a
UYQ
$2
bicssc
072
7
$a
TEC009000
$2
bisacsh
072
7
$a
UYQ
$2
thema
082
0 4
$a
006.3
$2
23
100
1
$a
Dutta, Nitul.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310785
245
1 0
$a
Cyber Security: Issues and Current Trends
$h
[electronic resource] /
$c
by Nitul Dutta, Nilesh Jadav, Sudeep Tanwar, Hiren Kumar Deva Sarma, Emil Pricop.
250
$a
1st ed. 2022.
264
1
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
XIII, 174 p. 131 illus., 100 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Studies in Computational Intelligence,
$x
1860-9503 ;
$v
995
505
0
$a
Chapter 1. Introduction to Cybersecurity -- Chapter 2. Being Hidden and Anonymous -- Chapter 3. TOR – The Onion Router -- Chapter 4. DarkNet and Hidden Services -- Chapter 5. Introduction to Digital Forensics -- Chapter 6. Intrusion Detection Systems fundamentals -- Chapter 7. Introduction to Malware Analysis -- Chapter 8. Design of a Virtual Cybersecurity Lab -- .Chapter 9. Importance of Cyber Law.
520
$a
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
650
2 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Crime Control and Security.
$3
1172058
650
2 4
$a
Cybercrime.
$3
1109747
650
1 4
$a
Computational Intelligence.
$3
768837
650
0
$a
Data protection.
$3
557764
650
0
$a
Criminology.
$3
563146
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Computational intelligence.
$3
568984
700
1
$a
Pricop, Emil.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1109103
700
1
$a
Sarma, Hiren Kumar Deva.
$e
editor.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1310784
700
1
$a
Tanwar, Sudeep.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1276845
700
1
$a
Jadav, Nilesh.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1397826
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811665967
776
0 8
$i
Printed edition:
$z
9789811665981
776
0 8
$i
Printed edition:
$z
9789811665998
830
0
$a
Studies in Computational Intelligence,
$x
1860-949X ;
$v
564
$3
1253640
856
4 0
$u
https://doi.org/10.1007/978-981-16-6597-4
912
$a
ZDB-2-INR
912
$a
ZDB-2-SXIT
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
950
$a
Intelligent Technologies and Robotics (R0) (SpringerNature-43728)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入