000 | 05874cam a2200697 i 4500 | ||
---|---|---|---|
001 | on1309090369 | ||
003 | OCoLC | ||
005 | 20240611145155.0 | ||
006 | m d | ||
007 | cr cnu|||unuuu | ||
008 | 220406s2022 nju ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dEBLCP _dYDX _dN$T _dORMDA _dSFB _dOCLCF _dIEEEE _dUKAHL _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ |
||
019 |
_a1305913913 _a1306024444 _a1306055311 |
||
020 |
_a9781119812555 _q(electronic bk. : oBook) |
||
020 |
_a1119812550 _q(electronic bk. : oBook) |
||
020 | _a1119812542 | ||
020 |
_a9781119812548 _q(electronic bk.) |
||
020 |
_a9781119812531 _q(electronic bk.) |
||
020 |
_a1119812534 _q(electronic bk.) |
||
020 | _z1119812496 | ||
020 | _z9781119812494 | ||
024 | 7 |
_a10.1002/9781119812555 _2doi |
|
035 |
_a3204549 _b(N$T) |
||
035 |
_a(OCoLC)1309090369 _z(OCoLC)1305913913 _z(OCoLC)1306024444 _z(OCoLC)1306055311 |
||
037 |
_a9781119812494 _bO'Reilly Media |
||
037 |
_a9820921 _bIEEE |
||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aCyber security and network security / _cedited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha. |
264 | 1 |
_aHoboken, NJ : _bWiley ; _aBeverly, MA : _bScrivener Publishing, _c2022. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aAdvances in Cyber Security Ser. | |
505 | 0 | _aFront Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aOnline resource; title from PDF title page (John Wiley, viewed April 6, 2022). | |
520 | _aCYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels. This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library. | ||
590 | _aAdded to collection customer.56279.3 | ||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 2 | _aComputer Security | |
650 | 6 | _aSécurité informatique. | |
650 | 6 |
_aRéseaux d'ordinateurs _xSécurité _xMesures. |
|
650 | 7 |
_aComputer networks _xSecurity measures _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
700 | 1 |
_aPramanik, Sabyasachi, _eeditor. |
|
700 | 1 |
_aSamanta, Debabrata, _d1987- _eeditor. _1https://id.oclc.org/worldcat/entity/E39PCjrxvbDrKY9rpQ3P6dYJTb |
|
700 | 1 |
_aVinay, M., _eeditor. |
|
700 | 1 |
_aGuha, Abhijit, _eeditor. |
|
776 | 0 | 8 |
_iPrint version: _aPramanik, Sabyasachi _tCyber Security and Network Security _dNewark : John Wiley & Sons, Incorporated,c2022 _z9781119812494 |
830 | 0 | _aAdvances in Cyber Security Ser. | |
856 | 4 | 0 |
_3EBSCOhost _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3204549 |
938 |
_aAskews and Holts Library Services _bASKH _nAH39986332 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6935208 |
||
938 |
_aYBP Library Services _bYANK _n17885417 |
||
938 |
_aEBSCOhost _bEBSC _n3204549 |
||
994 |
_a92 _bN$T |
||
999 |
_c257185 _d257185 |