Electronic catalog

el cat en


 

База данных: Electronic library

Page 1, Results: 3

Отмеченные записи: 0

DDC 005.8
A 22


    Advanced methodologies and technologies in system security, information privacy, and forensics / / Mehdi Khosrow-Pour, D.B.A., editor. - 4018/978-1-5225-7492-7. - Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : : IGI Global,, [2019]. - 1 online resource (38 PDFs (xv, 417 pages)) ( час. мин.), 4018/978-1-5225-7492-7. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/8E79827A-8603-4E3E-A4C5-762DB9C093F5. - ISBN 9781522574934 (electronic bk.). - ISBN 152257493X (electronic bk.)
"Premier reference source"--Cover image. Description based on title screen (IGI Global, viewed 09/07/2018).
Параллельные издания: Print version: :
    Содержание:
Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.

~РУБ DDC 005.8

Рубрики: Computer security.

   Data protection.


   Digital forensic science.


   Computer networks--Security measures.


   COMPUTERS / Security / General.


   COMPUTERS / Networking / Security.


   COMPUTERS / Security / Online Safety & Privacy.


Аннотация: "This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combating digital risks and cyber threats"--

Доп.точки доступа:
Khosrow-Pour, Mehdi, (1951-) \editor.\
IGI Global,

Advanced methodologies and technologies in system security, information privacy, and forensics / [Электронный ресурс] / Mehdi Khosrow-Pour, D.B.A., editor., [2019]. - 1 online resource (38 PDFs (xv, 417 pages)) с. (Введено оглавление)

1.

Advanced methodologies and technologies in system security, information privacy, and forensics / [Электронный ресурс] / Mehdi Khosrow-Pour, D.B.A., editor., [2019]. - 1 online resource (38 PDFs (xv, 417 pages)) с. (Введено оглавление)


DDC 005.8
A 22


    Advanced methodologies and technologies in system security, information privacy, and forensics / / Mehdi Khosrow-Pour, D.B.A., editor. - 4018/978-1-5225-7492-7. - Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : : IGI Global,, [2019]. - 1 online resource (38 PDFs (xv, 417 pages)) ( час. мин.), 4018/978-1-5225-7492-7. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/8E79827A-8603-4E3E-A4C5-762DB9C093F5. - ISBN 9781522574934 (electronic bk.). - ISBN 152257493X (electronic bk.)
"Premier reference source"--Cover image. Description based on title screen (IGI Global, viewed 09/07/2018).
Параллельные издания: Print version: :
    Содержание:
Section 1. Criminal science and forensics. Chapter 1. Forensic investigations in cloud computing ; Chapter 2. Internet-facilitated child sexual exploitation crimes ; Chapter 3. Knowledge-based forensic patterns and engineering system ; Chapter 4. Uncovering limitations of E01 self-verifying files -- Section 2. Cyber crime, cyber bullying, and digital terrorism. Chapter 5. Cyber security protection for online gaming applications ; Chapter 6. Piracy and intellectual property theft in the internet era ; Chapter 7. Secure group key sharing protocols and cloud system -- Section 3. Cyber and network security. Chapter 8. Security of internet-, intranet-, and computer-based examinations in terms of technical, authentication, and environmental, where are we? ; Chapter 9. A three-vector approach to blind spots in cybersecurity ; Chapter 10. Cyber bullying ; Chapter 11. Cyberbullying among Malaysian children based on research evidence ; Chapter 12. The nature, extent, causes, and consequences of cyberbullying -- Section 4. IT security and ethics. Chapter 13. Computer fraud challenges and its legal implications ; Chapter 14. Cost estimation and security investment of security projects ; Chapter 15. Development of personal information privacy concerns evaluation ; Chapter 16. Digital video watermarking using diverse watermarking schemes ; Chapter 17. Ethical computing continues from problem to solution ; Chapter 18. Group signature system using multivariate asymmetric cryptography ; Chapter 19. Hexa-dimension Code of practice for data privacy protection ; Chapter 20. Information and communication technology ethics and social responsibility ; Chapter 21. Intrusion tolerance techniques ; Chapter 22. New perspectives of pattern recognition for automatic credit card fraud detection ; Chapter 23. Privacy, algorithmic discrimination, and the Internet of things ; Chapter 24. The protection policy for youth online in Japan ; Chapter 25. Security of identity-based encryption algorithms ; Chapter 26. Steganography using biometrics ; Chapter 27. Usable security.

~РУБ DDC 005.8

Рубрики: Computer security.

   Data protection.


   Digital forensic science.


   Computer networks--Security measures.


   COMPUTERS / Security / General.


   COMPUTERS / Networking / Security.


   COMPUTERS / Security / Online Safety & Privacy.


Аннотация: "This book presents emerging research and methods on preventing information breaches and further securing system networks. While highlighting the rising concerns in information privacy and system security, this book explores the cutting-edge methods combating digital risks and cyber threats"--

Доп.точки доступа:
Khosrow-Pour, Mehdi, (1951-) \editor.\
IGI Global,

DDC 005.8
S 43


    Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
    Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.

~РУБ DDC 005.8

Рубрики: Big data.

   Cyber intelligence (Computer security)


   Privacy, Right of.


   Digital forensic science.


   Big data.


   Cyber intelligence (Computer security)


   Digital forensic science.


   Privacy, Right of.


Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--

Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,

Security, privacy, and forensics issues in big data / [Электронный ресурс] / [edited by] Ramesh C. Joshi, Brij B. Gupta., [2020]. - 1 online resource. с. (Введено оглавление)

2.

Security, privacy, and forensics issues in big data / [Электронный ресурс] / [edited by] Ramesh C. Joshi, Brij B. Gupta., [2020]. - 1 online resource. с. (Введено оглавление)


DDC 005.8
S 43


    Security, privacy, and forensics issues in big data / / [edited by] Ramesh C. Joshi, Brij B. Gupta. - 4018/978-1-5225-9742-1. - Hershey, Pennsylvania : : IGI Global,, [2020]. - 1 online resource. ( час. мин.), 4018/978-1-5225-9742-1. - (Advances in Information Security, Privacy, and Ethics (AISPE) Book Series). - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/A950C774-1418-44B4-A065-AC99B7006896. - ISBN 1522597441 (electronic book). - ISBN 9781522597445 (electronic bk.)
Description based on online resource; title from digital title page (viewed on December 02, 2019).
Параллельные издания: Print version: :
    Содержание:
Chapter 1. Securing the cloud for big data -- Chapter 2. Big data: challenges and solutions -- Chapter 3. Human factors in cybersecurity: issues and challenges in big data -- Chapter 4. Security and privacy challenges in big data -- Chapter 5. Cloud-centric blockchain public key infrastructure for big data applications -- Chapter 6. Security vulnerabilities, threats, and attacks in IoT and big data: challenges and solutions -- Chapter 7. Threat hunting in windows using big security log data -- Chapter 8. Nature-inspired techniques for data security in big data -- Chapter 9. Bootstrapping urban planning: addressing big data issues in smart cities -- Chapter 10. Securing online bank's big data through block chain technology: cross-border transactions security and tracking -- Chapter 11. Enhance data security and privacy in cloud -- Chapter 12. The unheard story of organizational motivations towards user privacy -- Chapter 13. Botnet and Internet of things (IoTs): a definition, taxonomy, challenges, and future directions -- Chapter 14. A conceptual model for the organizational adoption of information system security innovations -- Chapter 15. Theoretical foundations of deep resonance interference network: towards intuitive learning as a wave field phenomenon -- Chapter 16. Malware threat in internet of things and its mitigation analysis -- Chapter 17. Leveraging fog computing and deep learning for building a secure individual health-based decision support system to evade air pollution.

~РУБ DDC 005.8

Рубрики: Big data.

   Cyber intelligence (Computer security)


   Privacy, Right of.


   Digital forensic science.


   Big data.


   Cyber intelligence (Computer security)


   Digital forensic science.


   Privacy, Right of.


Аннотация: "This book focuses on the security, privacy, and forensics of big data. It also examines the principles, algorithms, challenges and applications related to the security, privacy, and forensics of big data"--

Доп.точки доступа:
Joshi, R. C., \editor.\
Gupta, Brij, (1982-) \editor.\
IGI Global,

DDC 363.25/2
J 74

Johansen, Gerard,.
    Digital forensics and incident response : : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen. - Second edition. - Birmingham : : Packt Publishing Ltd.,, 2020. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/512932CB-6CAE-4B53-AE68-0653554E28A5. - ISBN 9781838644086 (electronic book). - ISBN 1838644083 (electronic book)
Description based on online resource; title from digital title page (viewed on April 15, 2020).

~РУБ DDC 363.25/2 + DDC 363.25

Рубрики: Digital forensic science.

   Computer networks--Security measures.


   Computer crimes--Investigation.


   Forensic sciences--Data processing.


Johansen, Gerard,. Digital forensics and incident response : [Электронный ресурс] : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen., 2020. - 1 online resource с.

3.

Johansen, Gerard,. Digital forensics and incident response : [Электронный ресурс] : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen., 2020. - 1 online resource с.


DDC 363.25/2
J 74

Johansen, Gerard,.
    Digital forensics and incident response : : incident response techniques and procedures to respond to modern cyber threats / / Gerard Johansen. - Second edition. - Birmingham : : Packt Publishing Ltd.,, 2020. - 1 online resource. - Includes bibliographical references and index. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/512932CB-6CAE-4B53-AE68-0653554E28A5. - ISBN 9781838644086 (electronic book). - ISBN 1838644083 (electronic book)
Description based on online resource; title from digital title page (viewed on April 15, 2020).

~РУБ DDC 363.25/2 + DDC 363.25

Рубрики: Digital forensic science.

   Computer networks--Security measures.


   Computer crimes--Investigation.


   Forensic sciences--Data processing.


Page 1, Results: 3

 

All acquisitions for 
Or select a month