Cyber security threats and challenges facing human life / editedby Narendra M. Shekokar.
نوع المادة : ملف الحاسوبالناشر:Boca Raton, Florida : CRC Press, 2023تاريخ حقوق النشر: ©2023وصف:1 online resource (217 pages) : illustrationsنوع المحتوى:- text
- computer
- online resource
- 9781000645910
- QA76.9.A25 .C934 2023
نوع المادة | المكتبة الحالية | رقم الطلب | رابط URL | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
مصدر رقمي | UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية | رابط إلى المورد | لا يعار |
Includes bibliographical references and index.
SECTION 1 : Cyber Security Concepts and Applicants-- CHAPTER 1: Cyber Security Challenges in Digital Manufacturing and Possible Ways of Mitigation / Hari Vasudevan, Narendra M. Shekokar, Ramesh Rajguru, and Rajendra Khavekar-- CHAPTER 2: An Efficient Proxy Signature-Based Authority Delegation Scheme for Medical Cyber Physical Systems / Aparna Bannore, Rachana Y. Patil, and Satish R. Devane-- CHAPTER 3: Impact of the COVID-19 Pandemic on Cyber Security Issues in the Healthcare Domain: A Scoping Review / Minal D. Kalamkar and Rajesh Prasad-- CHAPTER 4: Cyber Threats: Fears for Industry / Sagar Rane, Garima Devi, and Sanjeev Wagh.
SECTION 2: Cyber Security and IoT-- Chapter 5: A Comprehensive Survey of Existing Security Techniques in the IoT Protocol Stack/ Smita Sanjay Ambarkar and Narendra M. Shekokar-- Chapter 6: Impact of Cyber Security Threats on IoT Applications / Aruna Gawade and Narendra M. Shekokar-- Chapter 7: The Need for Internet of Things (IoT) Forensics: Case Studies and Analysis / Jazib Dawre, Ishita Kheria, Ramchandra Sharad Mangrulkar, and Mangesh Ghonge.
SECTION 3: Detection Techniques-- CHAPTER 8: A Comparative Analysis of Tree-Based Algorithms in Malware Detection / Govind Thakur, Shreya Nayak, and Ramchandra Sharad Mangrulkar-- CHAPTER 9: An Assessment of Game-Based Cyber Defense Strategy for SDN / Vaishali A. Shirsath and M.M. Chandane-- CHAPTER 10: Smart Computing: Cyber Threats and Mitigation Techniques / Nilambari G. Narkar and Narendra M. Shekokar.
SECTION 4: Cyber Security and Languages-- Chapter 11. SQL Injection Attacks on Indian Websites: A Case Study / Nilesh Yadav and Narendra M. Shekokar.
SECTION 5: Cyber Security and Its Future-- CHAPTER 12. Effects of Side Channel Attacks on Data Security and Their New Age Countermeasures / Sridhar Chandramohan Iyer and Narendra M. Shekokar-- CHAPTER 13. Different Similarity Measures for Secure Name Matching in Record Linkage-- Vijay Maruti Shelake and Narendra M. Shekokar.
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2018. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.