صورة الغلاف المحلية
صورة الغلاف المحلية
عرض عادي

Cyber security threats and challenges facing human life / editedby Narendra M. Shekokar.

المساهم (المساهمين):نوع المادة : ملف الحاسوبملف الحاسوبالناشر:Boca Raton, Florida : CRC Press, 2023تاريخ حقوق النشر: ©2023وصف:1 online resource (217 pages) : illustrationsنوع المحتوى:
  • text
نوع الوسائط:
  • computer
نوع الناقل:
  • online resource
تدمك:
  • 9781000645910
الموضوع:النوع/الشكل:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 .C934 2023
المحتويات:
SECTION 1 : Cyber Security Concepts and Applicants-- CHAPTER 1: Cyber Security Challenges in Digital Manufacturing and Possible Ways of Mitigation / Hari Vasudevan, Narendra M. Shekokar, Ramesh Rajguru, and Rajendra Khavekar-- CHAPTER 2: An Efficient Proxy Signature-Based Authority Delegation Scheme for Medical Cyber Physical Systems / Aparna Bannore, Rachana Y. Patil, and Satish R. Devane-- CHAPTER 3: Impact of the COVID-19 Pandemic on Cyber Security Issues in the Healthcare Domain: A Scoping Review / Minal D. Kalamkar and Rajesh Prasad-- CHAPTER 4: Cyber Threats: Fears for Industry / Sagar Rane, Garima Devi, and Sanjeev Wagh.
SECTION 2: Cyber Security and IoT-- Chapter 5: A Comprehensive Survey of Existing Security Techniques in the IoT Protocol Stack/ Smita Sanjay Ambarkar and Narendra M. Shekokar-- Chapter 6: Impact of Cyber Security Threats on IoT Applications / Aruna Gawade and Narendra M. Shekokar-- Chapter 7: The Need for Internet of Things (IoT) Forensics: Case Studies and Analysis / Jazib Dawre, Ishita Kheria, Ramchandra Sharad Mangrulkar, and Mangesh Ghonge.
SECTION 3: Detection Techniques-- CHAPTER 8: A Comparative Analysis of Tree-Based Algorithms in Malware Detection / Govind Thakur, Shreya Nayak, and Ramchandra Sharad Mangrulkar-- CHAPTER 9: An Assessment of Game-Based Cyber Defense Strategy for SDN / Vaishali A. Shirsath and M.M. Chandane-- CHAPTER 10: Smart Computing: Cyber Threats and Mitigation Techniques / Nilambari G. Narkar and Narendra M. Shekokar.
SECTION 4: Cyber Security and Languages-- Chapter 11. SQL Injection Attacks on Indian Websites: A Case Study / Nilesh Yadav and Narendra M. Shekokar.
SECTION 5: Cyber Security and Its Future-- CHAPTER 12. Effects of Side Channel Attacks on Data Security and Their New Age Countermeasures / Sridhar Chandramohan Iyer and Narendra M. Shekokar-- CHAPTER 13. Different Similarity Measures for Secure Name Matching in Record Linkage-- Vijay Maruti Shelake and Narendra M. Shekokar.
قوائم هذه المادة تظهر في: Electronic Books | الكتب الإلكترونية
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رابط URL حالة تاريخ الإستحقاق الباركود
مصدر رقمي مصدر رقمي UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية رابط إلى المورد لا يعار

Includes bibliographical references and index.

SECTION 1 : Cyber Security Concepts and Applicants-- CHAPTER 1: Cyber Security Challenges in Digital Manufacturing and Possible Ways of Mitigation / Hari Vasudevan, Narendra M. Shekokar, Ramesh Rajguru, and Rajendra Khavekar-- CHAPTER 2: An Efficient Proxy Signature-Based Authority Delegation Scheme for Medical Cyber Physical Systems / Aparna Bannore, Rachana Y. Patil, and Satish R. Devane-- CHAPTER 3: Impact of the COVID-19 Pandemic on Cyber Security Issues in the Healthcare Domain: A Scoping Review / Minal D. Kalamkar and Rajesh Prasad-- CHAPTER 4: Cyber Threats: Fears for Industry / Sagar Rane, Garima Devi, and Sanjeev Wagh.

SECTION 2: Cyber Security and IoT-- Chapter 5: A Comprehensive Survey of Existing Security Techniques in the IoT Protocol Stack/ Smita Sanjay Ambarkar and Narendra M. Shekokar-- Chapter 6: Impact of Cyber Security Threats on IoT Applications / Aruna Gawade and Narendra M. Shekokar-- Chapter 7: The Need for Internet of Things (IoT) Forensics: Case Studies and Analysis / Jazib Dawre, Ishita Kheria, Ramchandra Sharad Mangrulkar, and Mangesh Ghonge.

SECTION 3: Detection Techniques-- CHAPTER 8: A Comparative Analysis of Tree-Based Algorithms in Malware Detection / Govind Thakur, Shreya Nayak, and Ramchandra Sharad Mangrulkar-- CHAPTER 9: An Assessment of Game-Based Cyber Defense Strategy for SDN / Vaishali A. Shirsath and M.M. Chandane-- CHAPTER 10: Smart Computing: Cyber Threats and Mitigation Techniques / Nilambari G. Narkar and Narendra M. Shekokar.

SECTION 4: Cyber Security and Languages-- Chapter 11. SQL Injection Attacks on Indian Websites: A Case Study / Nilesh Yadav and Narendra M. Shekokar.

SECTION 5: Cyber Security and Its Future-- CHAPTER 12. Effects of Side Channel Attacks on Data Security and Their New Age Countermeasures / Sridhar Chandramohan Iyer and Narendra M. Shekokar-- CHAPTER 13. Different Similarity Measures for Secure Name Matching in Record Linkage-- Vijay Maruti Shelake and Narendra M. Shekokar.

Description based on print version record.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

اضغط على الصورة لمشاهدتها في عارض الصور

صورة الغلاف المحلية
شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة