Description: Case Studies in Secure Computing by Biju Issac, Nauman Israr In todays age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detectionIntroduces a set of common fuzzy-logic-based security risk estimation techniques with examplesProposes a secure authenticated multiple-key establishment protocol for wireless sensor networksInvestigates various malicious activities associated with cloud computing and proposes some countermeasuresExamines current and emerging security threats in long-term evolution backhaul and core networksSupplies a brief introduction to application-layer denial-of-service (DoS) attacksIllustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems. FORMAT Paperback LANGUAGE English CONDITION Brand New Author Biography Dr. Biju Issac is a senior lecturer at the School of Computing, Teesside University, United Kingdom, and has more than 15 years of academic experience with higher education in India, Malaysia, and the United Kingdom. He earned a PhD in networking and mobile communications, along with MCA (master of computer applications) and BE (electronics and communications engineering). He is a senior Institute of Electrical and Electronics Engineers (IEEE) member, a fellow of the Higher Education Academy, an Institution of Engineering and Technology (IET) member, and a chartered engineer (CEng). He is a CISCO-Certified Network Associate (CCNA) instructor, a Sun-Certified Java instructor, and a Lotus Notes professional. His broad research interests are in computer networks, wireless networks, computer or network security, mobility management in 802.11 networks, intelligent computing, data mining, spam detection, secure online voting, e-learning, and so forth. Dr. Issac has authored more than 60 peer-reviewed research publications, including conference papers, book chapters, and journal papers. He has supervised postgraduate research students to completion. He is in the technical program committee of many international conferences and on the editorial board of some journals and has reviewed many research papers.Dr. Nauman Israr has been a senior lecturer at the School of Computing, Teesside University, United Kingdom, for many years. He earned his PhD in wireless sensor networks at the University of Bradford, United Kingdom. He teaches computer networks–related subjects at the university. His areas of research expertise are wireless sensor networks, wireless networked control systems, fly-by-wireless systems, active aircraft, and wireless embedded systems. Dr. Israr was a research fellow at Queens University Belfast (Active Aircraft Project). The aim of that project was to design and develop a wireless nervous system for the next-generation Airbus aircrafts, where the wireless system will be used to reduce the turbulence on the aircraft, thus reducing the fuel burned. He has published a number of conference papers, book chapters, and journal papers. Table of Contents Intelligent Computing Case Studies. Secure Computing Case Studies. Details ISBN1138034134 Pages 500 Publisher Taylor & Francis Ltd Year 2016 ISBN-10 1138034134 ISBN-13 9781138034136 Format Paperback Imprint CRC Press Subtitle Achievements and Trends Place of Publication London Country of Publication United Kingdom Edited by Nauman Israr DEWEY 005.8 Publication Date 2016-10-19 Short Title Case Studies in Secure Computing Language English UK Release Date 2016-10-19 AU Release Date 2016-10-19 NZ Release Date 2016-10-19 Author Nauman Israr Illustrations 59 Tables, black and white; 166 Illustrations, black and white Alternative 9780367845865 Audience Professional & Vocational We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:134451678;
Price: 169.79 AUD
Location: Melbourne
End Time: 2025-01-13T03:30:33.000Z
Shipping Cost: 9.34 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
ISBN-13: 9781138034136
Book Title: Case Studies in Secure Computing
Number of Pages: 500 Pages
Language: English
Publication Name: Case Studies in Secure Computing: Achievements and Trends
Publisher: Taylor & Francis Ltd
Publication Year: 2016
Subject: Computer Science
Item Height: 254 mm
Item Weight: 454 g
Type: Textbook
Author: Biju Issac, Nauman Israr
Subject Area: Mechanical Engineering
Item Width: 178 mm
Format: Paperback