000 02657nam a2200277Ia 4500
003 OSt
005 20251113105949.0
008 220909b |||||||| |||| 00| 0 eng d
020 _a9781482207064
037 _cTextual
040 _aCSL
_beng
_cCSL
041 _aeng
084 _aD65,8(B):(894) Q5
_qCSL
245 0 _c/ edited by BijuIssac and Nauman Israr
_aCase studies in secure computing
_b: Achievements and trends
260 _aBoca Raton :
_bCRC Press,
_c2015.
300 _axxii, 478p.
_b: ill.
500 _aIndex 457-478p.
520 _aIn today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies. This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book: Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks Investigates various malicious activities associated with cloud computing and proposes some countermeasures Examines current and emerging security threats in long-term evolution backhaul and core networks Supplies a brief introduction to application-layer denial-of-service (DoS) attacks Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon. This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.
650 _a Computer networks
_9851074
650 _a Security measures
_9851075
650 _aComputer security
_9851076
700 _aIssac, Biju
_eeditor
_9851077
700 _aIsrar, Nauman
_eeditor
_9851078
942 _hD65,8(B):(894) Q5
_cTEXL
_2CC
_n0
999 _c6570
_d6570