ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cyber defense mechanisms security, privacy, and challenges

دانلود کتاب مکانیسم های دفاع سایبری امنیت، حریم خصوصی و چالش ها

Cyber defense mechanisms security, privacy, and challenges

مشخصات کتاب

Cyber defense mechanisms security, privacy, and challenges

ویرایش:  
نویسندگان: , ,   
سری: Artificial intelligence (AI). Elementary to advanced practices 
ISBN (شابک) : 9780367816438, 036740883X 
ناشر: CRC Press 
سال نشر: 2020;2021 
تعداد صفحات: 231 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 10 مگابایت 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Cyber defense mechanisms security, privacy, and challenges به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مکانیسم های دفاع سایبری امنیت، حریم خصوصی و چالش ها نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مکانیسم های دفاع سایبری امنیت، حریم خصوصی و چالش ها

این کتاب تکامل مسائل امنیتی و حریم خصوصی را مورد بحث قرار می دهد و ابزارها، تکنیک ها و راه حل های فنی مرتبط را در یک منبع واحد آورده است.

این کتاب خوانندگان را به سفری برای درک مسائل امنیتی و راه‌حل‌های احتمالی شامل تهدیدها، حملات و مکانیسم‌های دفاعی مختلف می‌برد که شامل اینترنت اشیا، محاسبات ابری، داده‌های بزرگ، رمزنگاری سبک وزن برای بلاک‌چین، و تکنیک های فشرده داده و اینکه چگونه می توان آن را برای کاربردهای مختلف برای استفاده عمومی و خاص اعمال کرد.

دانشجویان، محققان و کسانی که در این صنعت کار می کنند، فارغ التحصیلان و فارغ التحصیلان و کسانی که در این صنعت کار می کنند، درک و استفاده از این کتاب برای برنامه های امنیتی و مسائل مربوط به حریم خصوصی آسان است.


توضیحاتی درمورد کتاب به خارجی

This book discusses the evolution of security and privacy issues and brings related technological tools, techniques, and solutions into one single source.    

The book will take readers on a journey to understanding the security issues and possible solutions involving various threats, attacks, and defense mechanisms, which include IoT, cloud computing, Big Data, lightweight cryptography for blockchain, and data-intensive techniques, and how it can be applied to various applications for general and specific use.    

Graduate and postgraduate students, researchers, and those working in this industry will find this book easy to understand and use for security applications and privacy issues.



فهرست مطالب

Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Preface
Editors
Contributors
Chapter 1 Security Threat Analysis and Prevention towards Attack Strategies
	1.1 Introduction
	1.2 History of Security Breaches
	1.3 Common Security Threats
		1.3.1 Malware
		1.3.2 Phishing
		1.3.3 Spear Phishing
		1.3.4 “Man in the Middle” (MitM) Attack
		1.3.5 Trojans
		1.3.6 Ransomware
		1.3.7 Denial-of-Service Attack or Distributed Denial-of-Service Attack (DDoS)
		1.3.8 Attacks on IoT Devices
		1.3.9 Data Breaches
		1.3.10 Malware on Mobile Apps
	1.4 Security Challenges in Modern Day
		1.4.1 Cloud Computing
		1.4.2 Social Media
		1.4.3 Smart Phones
		1.4.4 General Data Protection Regulations (GDPR)
		1.4.5 Attacks Based on Machine Learning and AI
		1.4.6 Attacks against Cryptocurrencies and Blockchain Systems
		1.4.7 Switching to DevOps
		1.4.8 Biometric Authentication
		1.4.9 Fileless Malware
	1.5 Attack Strategies and Brief Study on Advanced Persistent Threat (APT)
		1.5.1 How an APT Attack Works
		1.5.2 Some Instances of APTs
		1.5.3 Characteristics of APTs
	1.6 Prevention Measures
		1.6.1 Identify the Threats
		1.6.2 Beware of Cybercrimes
		1.6.3 Observe All Stakeholders
		1.6.4 Usage of Two-Factor Authentication
		1.6.5 Conduct Regular Audits
		1.6.6 Draft a Credit Sign-Off Policy
		1.6.7 Protect Vital Data
		1.6.8 Perform Risk Assessments
		1.6.9 Insure against Cybercrime
		1.6.10 Gather In-Depth Knowledge about Risk Factors
	1.7 Threat Modeling
	1.8 Role of a Threat Analyst
	1.9 Summary
	References
Chapter 2 Defense against the Survivability to Network Strategies
	2.1 Introduction
	2.2 Survivability Network Architecture—SONET and Self-Healing Ring Transportation
	2.3 Single-Access Optical Network Ring Architecture
	2.4 Multiaccess Optical Network Ring Architecture
	2.5 Channel Demand Routing Ring Architecture
	2.6 Result
	2.7 Conclusion
	References
Chapter 3 Defense Mechanism to Self-Adaptive Cyber-Physical Security Systems
	3.1 Introduction
	3.2 Background Knowledge of CPS
	3.3 Application Areas of Cyber-Physical System (CPS)
	3.4 Philosophical Issues of CPS
	3.5 Principle of CPS Operation
	3.6 Architecture of CPS
		3.6.1 Physical Layer
		3.6.2 Data Link Layer
		3.6.3 Network Layer
		3.6.4 Transport Layer
		3.6.5 Session Layer
		3.6.6 Presentation Layer
		3.6.7 Application Layer
	3.7 Self-Adaptive Patterns
		3.7.1 Synthesis Utilized Pattern
		3.7.2 Synthesis Command Patterns
		3.7.3 Collect Organized Patterns
	3.8 Security Threats of CPS
	3.9 Attacks on CPS
	3.10 Attacks and Its Consequences
	3.11 Adversaries’ Characteristics
	3.12 Conclusion
	References
Chapter 4 Secure Channel Allocation in Cognitive Radio–Wireless Sensor Networks
	4.1 Introduction
	4.2 Related Works
	4.3 System Model
	4.4 Common Attacks in CR-WSN
		4.4.1 Replay Attack
		4.4.2 Node-Targeted Attack
		4.4.3 Power Consumption Attack
		4.4.4 Location Privacy
	4.5 Performance Evaluation
		4.5.1 Countermeasures in CR-WSN
	4.6 Conclusion and Future Work
	References
Chapter 5 Security Issues in IoT Networks
	5.1 Introduction
	5.2 Challenges for IoT Network
		5.2.1 The Most Important Challenges in IoT Network
			5.2.1.1 Schema Processing
			5.2.1.2 Speed
			5.2.1.3 The Value
			5.2.1.4 The Security
	5.3 Elements for the Internet of Things (IoT)
	5.4 Cases and Scenarios for IoT Network
		5.4.1 Clustering
		5.4.2 Tracking
		5.4.3 Tactical Networks and High Dynamic Network
	5.5 The Vision of Internet of Things (IoT)
	5.6 Software-Defined IoT
	5.7 IoT Architecture
	5.8 Algorithm for Internet of Things (IoT)
	5.9 Business Context of the IoT
	5.10 IoT Device Information Collection Process
	5.11 Introduction to IoT Security
	5.12 D evelopment of IoT Security Mechanisms
	5.13 Security Attacks in IoT
	5.14 IoT Security Challenges
		5.14.1 IoT Security Risks and Challenges
		5.14.2 IoT Security Requirements
	5.15 Conclusion
	References
Chapter 6 IoT Ecosystem Implications to Real-World Security Scenario
	6.1 IoT Ecosystem History
	6.2 IoT Ecosystem
		6.2.1 Building an IoT Ecosystem
	6.3 Challenges in Building an Ecosystem
	6.4 IoT Ecosystem Implications
	6.5 IoT Security Implications
	6.6 Current IoT Security Scenario and Trends
		6.6.1 Why These Are Not Enough
		6.6.2 The Ideal Security System
	6.7 A Solution—Blockchain Technology
		6.7.1 Implementing Blockchain in an IoT Ecosystem
	6.8 Conclusion
	References
Chapter 7 Design Principles and Privacy in Cloud Computing
	7.1 Introduction
		7.1.1 Evolution of Cloud Computing
		7.1.2 Applications of Cloud Computing in Various Domains
		7.1.3 Generalized Architecture for Cloud Computing
		7.1.4 Design Principles in Cloud Computing
		7.1.5 Privacy Issues in Cloud Computing
		7.1.6 Chapter Outline
	7.2 Security Requirements and Attacks in Cloud Computing
		7.2.1 Threat Model
		7.2.2 Security Requirements in Cloud Computing
		7.2.3 Security Attacks in Cloud Computing
	7.3 Taxonomy of Security and Privacy Preservation Protocols in Cloud Computing
		7.3.1 Key Management
		7.3.2 User Authentication/Device Authentication
		7.3.3 Access Control/User Access Control
		7.3.4 Intrusion Detection
		7.3.5 Privacy Preservation
	7.4 Challenges and Future Research Directions
		7.4.1 Design of Lightweight Security Protocols
		7.4.2 Securing Data Mining Methods
		7.4.3 Granular Auditing
		7.4.4 Blockchain-Based Decentralized Mechanisms
	7.5 Conclusion
	Bibliography
Chapter 8 Big Data Analysis on Smart Tools and Techniques
	8.1 Introduction
	8.2 Big Data Challenges
	8.3 Big Data Analysis Techniques and Tools
		8.3.1 Data Mining
		8.3.2 Web Mining
		8.3.3 Visualization Methods
		8.3.4 Machine Learning
		8.3.5 Multilayer Perceptron (MLP)
		8.3.6 Kohonen Self-Organizing Feature Maps (SOFMs)
		8.3.7 Support Vector Machine (SVM)
		8.3.8 Optimization Methods
		8.3.9 Stochastic Optimization
		8.3.10 Deterministic Optimization
	8.4 Related Work
	8.5 Discussion and Conclusion
		8.5.1 Discussion
		8.5.2 Conclusion
	References
Chapter 9 Lightweight Security Protocols for Blockchain Technology
	9.1 Introduction
	9.2 Blockchain Technology Design Space
	9.3 Consensus
		9.3.1 Distinct Features of Blockchain Distributed Architecture
	9.4 Practical Applications of Blockchain
	9.5 Advantages and Disadvantages of Blockchain
		9.5.1 Advantages
		9.5.2 Disadvantages
	9.6 Limitations and Drawbacks of Blockchain
	9.7 Comparative Study on Authentication Protocols for Blockchain Technology
		9.7.1 Comparison of Security and Functionality Features
		9.7.2 Comparison of Communication Costs
		9.7.3 Comparison of Computation Costs
	9.8 Deployment and Implementation of Testbeds for Blockchain
	9.9 Conclusion
	Acknowledgments
	Bibliography
Chapter 10 Privacy and Challenges to Data-Intensive Techniques
	10.1 Introduction
	10.2 Advantages of Cybersecurity
	10.3 Approach and Workflow
		10.3.1 Common Steps in Cybersecurity
		10.3.2 Set Up Your Risk Management Regime
	10.4 Cybersecurity Principles and Goals
	10.5 Strategies and Methodologies Used to Achieve Cybersecurity Solution
		10.5.1 Confidentiality
			10.5.1.1 Tools for Confidentiality
		10.5.2 Integrity
			10.5.2.1 Tools for Integrity
		10.5.3 Availability
			10.5.3.1 Tools of Availability
		10.5.4 Challenges of Cybersecurity
		10.5.5 Data Security Consideration
	10.6 Privacy Preservation
		10.6.1 Privacy in Cybersecurity
		10.6.2 Data-Intensive Technology
	10.7 Challenges in Data-Intensive Techniques
	10.8 Cybersecurity to Data-Intensive Techniques
		10.8.1 Challenges to Cybersecurity to Data-Intensive Techniques
	10.9 Conclusion
	References
Chapter 11 Dynamic Modeling on Malware and Its Defense in Wireless Computer Network Using Pre-Quarantine
	11.1 Introduction
	11.2 Related Works
	11.3 Nomenclature
	11.4 Formulation of Mathematical Model and Assumptions
	11.5 Mathematical Model (S, Q, I, Q[sub(1)], R)
	1 11.6 Basic Reproduction Number and Equilibrium
	11.7 Existence and Stability Analysis
	11.8 Conclusion
	References
Chapter 12 Privacy Preservation Algorithms on Cryptography for AI as Human-like Robotic Player for Fighting Game Using Rule-Based Method
	12.1 Introduction
	12.2 Purpose and Goal of the Research
	12.3 Relationship between the AI/Human Players and the System
	12.4 Game-Related Information
		12.4.1 Game Rules
		12.4.2 Character Information
	12.5 Approach
		12.5.1 Rule-Based Method Structure
		12.5.2 Rule Analysis of the Fighting Game Player
		12.5.3 Methodology
	12.6 Experiment
		12.6.1 Environment and Settings
		12.6.2 Results and Discussions
		12.6.3 Comparison of Experiments between Removing Some Rules and Removing All Rules of My Computer Player
	12.7 C onclusion
	References
Chapter 13 Web-Based Smart Agriculture System
	13.1 Introduction
	13.2 Major Factors of Smart Agriculture
		13.2.1 Increase in Agriculture Productivity
		13.2.2 Minimizing Agriculture Greenhouse Gases
	13.3 Ancient Farming Technology and Machinery
		13.3.1 Old Techniques
		13.3.2 Old Machinery
	13.4 Drawbacks of Old Techniques
	13.5 Tools Used For Smart Agriculture
		13.5.1 GPS Locator
		13.5.2 Sensors
		13.5.3 Remote Sensing
		13.5.4 Automatic Irrigation and Watering
		13.5.5 Drones
		13.5.6 Driverless Tractor
	13.6 New Methods Used For Smart Agriculture
	13.7 Land Use System: Agroforestry
	13.8 Smart Technology Used For Farming
		13.8.1 IoT in Agriculture
		13.8.2 Cloud Computing
		13.8.3 Robots
		13.8.4 Genetic Algorithm in Smart Farming
	13.9 Security Challenges
	13.10 Conclusion
	References
Index




نظرات کاربران