000 05874cam a2200697 i 4500
001 on1309090369
003 OCoLC
005 20240611145155.0
006 m d
007 cr cnu|||unuuu
008 220406s2022 nju ob 001 0 eng d
040 _aDG1
_beng
_erda
_epn
_cDG1
_dOCLCO
_dEBLCP
_dYDX
_dN$T
_dORMDA
_dSFB
_dOCLCF
_dIEEEE
_dUKAHL
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
019 _a1305913913
_a1306024444
_a1306055311
020 _a9781119812555
_q(electronic bk. : oBook)
020 _a1119812550
_q(electronic bk. : oBook)
020 _a1119812542
020 _a9781119812548
_q(electronic bk.)
020 _a9781119812531
_q(electronic bk.)
020 _a1119812534
_q(electronic bk.)
020 _z1119812496
020 _z9781119812494
024 7 _a10.1002/9781119812555
_2doi
035 _a3204549
_b(N$T)
035 _a(OCoLC)1309090369
_z(OCoLC)1305913913
_z(OCoLC)1306024444
_z(OCoLC)1306055311
037 _a9781119812494
_bO'Reilly Media
037 _a9820921
_bIEEE
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
049 _aMAIN
245 0 0 _aCyber security and network security /
_cedited by Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha.
264 1 _aHoboken, NJ :
_bWiley ;
_aBeverly, MA :
_bScrivener Publishing,
_c2022.
300 _a1 online resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aAdvances in Cyber Security Ser.
505 0 _aFront Matter -- Securing Cloud-Based Enterprise Applications and Its Data / Subhradip Debnath, Aniket Das, Budhaditya Sarkar -- High-Performance Computing-Based Scalable "Cloud Forensics-as-a-Service" Readiness Framework Factors-A Review / Srinivasa Rao Gundu, Charanarur Panem, S Satheesh -- Malware Identification, Analysis and Similarity / Subhradip Debnath, Soumyanil Biswas -- Robust Fraud Detection Mechanism / Balajee Maram, Veerraju Gampala, Satish Muppidi, T Daniya -- Blockchain-Based Identity Management Systems / Ramani Selvanambi, Bhavya Taneja, Priyal Agrawal, Henil Jayesh Thakor, Marimuthu Karuppiah -- Insights Into Deep Steganography: A Study of Steganography Automation and Trends / R Gurunath, Debabrata Samanta, Digvijay Pandey -- Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System / Manas Kumar Yogi, ASN Chakravarthy -- Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission / Binay Kumar Pandey, Digvijay Pandey, Subodh Wairya, Gaurav Agarwal, Pankaj Dadeech, Sanwta Ram Dogiwal, Sabyasachi Pramanik -- Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) / Devasis Pradhan, Prasanna Kumar Sahu, Nitin S Goje, Mangesh M Ghonge, Hla Myo Tun, R Rajeswari, Sabyasachi Pramanik -- A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology / Subhodip Mukherjee, Debabrata Sarddar, Rajesh Bose, Sandip Roy -- Big Data Architecture for Network Security / Bijender Bansal, V Nisha Jenipher, Rituraj Jain, R Dilip, Makhan Kumbhkar, Sabyasachi Pramanik, Sandip Roy, Ankur Gupta -- About the Editors -- Index -- Also of Interest
504 _aIncludes bibliographical references and index.
588 0 _aOnline resource; title from PDF title page (John Wiley, viewed April 6, 2022).
520 _aCYBER SECUTIRY AND NETWORK SECURITY Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals. Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels. This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.
590 _aAdded to collection customer.56279.3
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
650 2 _aComputer Security
650 6 _aSécurité informatique.
650 6 _aRéseaux d'ordinateurs
_xSécurité
_xMesures.
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_2fast
700 1 _aPramanik, Sabyasachi,
_eeditor.
700 1 _aSamanta, Debabrata,
_d1987-
_eeditor.
_1https://id.oclc.org/worldcat/entity/E39PCjrxvbDrKY9rpQ3P6dYJTb
700 1 _aVinay, M.,
_eeditor.
700 1 _aGuha, Abhijit,
_eeditor.
776 0 8 _iPrint version:
_aPramanik, Sabyasachi
_tCyber Security and Network Security
_dNewark : John Wiley & Sons, Incorporated,c2022
_z9781119812494
830 0 _aAdvances in Cyber Security Ser.
856 4 0 _3EBSCOhost
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3204549
938 _aAskews and Holts Library Services
_bASKH
_nAH39986332
938 _aProQuest Ebook Central
_bEBLB
_nEBL6935208
938 _aYBP Library Services
_bYANK
_n17885417
938 _aEBSCOhost
_bEBSC
_n3204549
994 _a92
_bN$T
999 _c257185
_d257185