Cyber Security and Network Security

Book description

CYBER SECUTIRY AND NETWORK SECURITY

Written and edited by a team of experts in the field, this is the most comprehensive and up-to-date study of the practical applications of cyber security and network security for engineers, scientists, students, and other professionals.

Digital assaults are quickly becoming one of the most predominant issues on the planet. As digital wrongdoing keeps on expanding, it is increasingly more important to investigate new methodologies and advances that help guarantee the security of online networks. Ongoing advances and innovations have made great advances for taking care of security issues in a methodical manner. In light of this, organized security innovations have been delivered so as to guarantee the security of programming and correspondence functionalities at fundamental, improved, and engineering levels.

This outstanding new volume covers all of the latest advances, innovations, and developments in practical applications for cybersecurity and network security. This team of editors represents some of the most well-known and respected experts in the area, creating this comprehensive, up-to-date coverage of the issues of the day and state of the art. Whether for the veteran engineer or scientist or a student, this volume is a must-have for any library.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Dedication
  5. Preface
  6. Acknowledgments
  7. 1 Securing Cloud-Based Enterprise Applications and Its Data
    1. 1.1 Introduction
    2. 1.2 Background and Related Works
    3. 1.3 System Design and Architecture
    4. 1.4 Methodology
    5. 1.5 Performance Analysis
    6. 1.6 Future Research Direction
    7. 1.7 Conclusion
    8. References
  8. 2 High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review
    1. 2.1 Introduction
    2. 2.2 Aim of the Study
    3. 2.3 Motivation for the Study
    4. 2.4 Literature Review
    5. 2.5 Research Methodology
    6. 2.6 Testing Environment Plan
    7. 2.7 Testing
    8. 2.8 Recommendations
    9. 2.9 Limitations of Present Study
    10. 2.10 Conclusions
    11. 2.11 Scope for the Future Work
    12. Acknowledgements
    13. References
  9. 3 Malware Identification, Analysis and Similarity
    1. 3.1 Introduction
    2. 3.2 Background and Related Works
    3. 3.3 Proposed System Design Architecture
    4. 3.4 Methodology
    5. 3.5 Performance Analysis
    6. 3.6 Future Research Direction
    7. 3.7 Conclusion
    8. References
  10. 4 Robust Fraud Detection Mechanism
    1. 4.1 Introduction
    2. 4.2 Related Work
    3. 4.3 Conclusion
    4. References
  11. 5 Blockchain-Based Identity Management Systems
    1. 5.1 Introduction
    2. 5.2 Preliminaries
    3. 5.3 Blockchain-Based Identity Management System
    4. 5.4 Discussion
    5. 5.5 Conclusion
    6. 5.6 Future Scope
    7. References
  12. 6 Insights Into Deep Steganography: A Study of Steganography Automation and Trends
    1. 6.1 Introduction
    2. 6.2 Convolution Network Learning
    3. 6.3 Recurrent Neural Networks
    4. 6.4 Long Short-Term Memory Networks
    5. 6.5 Back Propagation in Neural Networks
    6. 6.6 Literature Survey on Neural Networks in Steganography
    7. 6.7 Optimization Algorithms in Neural Networks
    8. 6.8 Conclusion
    9. References
  13. 7 Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System
    1. 7.1 Introduction
    2. 7.2 Problem Formulation
    3. 7.3 Proposed Mechanism
    4. 7.4 Experimental Results
    5. 7.5 Future Scope
    6. 7.6 Conclusion
    7. References
  14. 8 Application of Integrated Steganography and Image Compressing Techniques for Confidential Information Transmission
    1. 8.1 Introduction
    2. 8.2 Review of Literature
    3. 8.3 Methodology Used
    4. 8.4 Results and Discussion
    5. 8.5 Conclusions
    6. References
  15. 9 Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN)
    1. 9.1 Introduction
    2. 9.2 Overview of 5G
    3. 9.3 Key Enabling Techniques for 5G
    4. 9.4 5G Green Network
    5. 9.5 5G Technologies: Security and Privacy Issues
    6. 9.6 5G-GN Assets and Threats
    7. 9.7 5G-GN Security Strategies and Deployments
    8. 9.8 Risk Analysis of 5G Applications
    9. 9.9 Countermeasures Against Security and Privacy Risks
    10. 9.10 Protecting 5G Green Networks Against Attacks
    11. 9.11 Future Challenges
    12. 9.12 Conclusion
    13. References
  16. 10 A Novel Cost-Effective Secure Green Data Center Solutions Using Virtualization Technology
    1. 10.1 Introduction
    2. 10.2 Literature Survey
    3. 10.3 Problem Statement
    4. 10.4 Green it Using Virtualization
    5. 10.5 Proposed Work
    6. 10.6 Conclusion
    7. Acknowledgments
    8. References
  17. 11 Big Data Architecture for Network Security
    1. 11.1 Introduction to Big Data
    2. 11.2 Technology Used to Big Data
    3. 11.3 Working Process of Techniques
    4. 11.4 Proposed Work
    5. 11.5 Comparative Analysis
    6. 11.6 Conclusion and Future Scope
    7. References
  18. About the Editors
  19. Index
  20. Also of Interest
  21. End User License Agreement

Product information

  • Title: Cyber Security and Network Security
  • Author(s): Sabyasachi Pramanik, Debabrata Samanta, M. Vinay, Abhijit Guha
  • Release date: April 2022
  • Publisher(s): Wiley-Scrivener
  • ISBN: 9781119812494