Security Analytics
Home > Computing and Information Technology > Computer security > Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)
Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)

Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The book gives a comprehensive overview of security issues in cyber physical systems by examining and analyzing the vulnerabilities. It also brings current understanding of common web vulnerabilities and its analysis while maintaining awareness and knowledge of contemporary standards, practices, procedures and methods of Open Web Application Security Project. This book is a medium to funnel creative energy and develop new skills of hacking and analysis of security and expedites the learning of the basics of investigating crimes, including intrusion from the outside and damaging practices from the inside, how criminals apply across devices, networks, and the internet at large and analysis of security data. Features Helps to develop an understanding of how to acquire, prepare, visualize security data. Unfolds the unventured sides of the cyber security analytics and helps spread awareness of the new technological boons. Focuses on the analysis of latest development, challenges, ways for detection and mitigation of attacks, advanced technologies, and methodologies in this area. Designs analytical models to help detect malicious behaviour. The book provides a complete view of data analytics to the readers which include cyber security issues, analysis, threats, vulnerabilities, novel ideas, analysis of latest techniques and technology, mitigation of threats and attacks along with demonstration of practical applications, and is suitable for a wide-ranging audience from graduates to professionals/practitioners and researchers.

Table of Contents:
1. A reliable blockchain application for Music in a decentralized Network. 2. An authentic data centric application for medical store. 3. Intelligent Data Analytic Approach for Restaurant Recommendation. 4. Investigation on Mobile Forensics tools to decode cyber crime. 5. Investigation of Feeding Strategies in Microstrip Patch Antenna for Various Applications. 6. Optical encryption of images using partial pivoting lower upper decomposition based on two structured deterministic phase masks in the hybrid transform domain. 7. A Comparative Analysis of Blockchain Integrated IOT Applications. 8. Blockchain: A next power-driven technology for smart cities. 9. Mutual surf scaling factor features analysis for detecting DDOS attacks based on lattice behavioral using spread spectral soft-max-recurrent neural network. 10. Provably Secure Role Delegation Scheme for Medical Cyber Physical System. 11. FRAME Routing Protocol to handle security attacks in Wireless Sensor Networks. 12. A Blockchain security management based Rehashing shift code Rail encryption using circular shift round random padding key for decentralized cloud environment. 13. Application of Exact Barrier-Penalty Function for developing privacy mechanism in cyber physical system.

About the Author :
Dr. Mehak Khurana is a Certified Ethical Hacker (CEH) and has more than 11 years of experience in teaching and research. She is currently working as an Assistant Professor at The NorthCap University, Gurugram. Prior to that, she has worked at HMRITM, GGSIPU. She earned a Ph.D. degree in the field of Information Security and Cryptography. She completed her M. Tech degree with a silver medal in Information Technology from USICT, GGSIPU, Delhi. To better align the department with the industry’s best practices, she introduced and designed courses on Penetration Testing, Secure Coding and Software Vulnerabilities, Web and Mobile Security. She also organized International Conference on Cyber Security and Digital Forensics in 2021 in collaboration with Springer as a Convener. Her specialization is cybersecurity, information security, and cryptography. She has published many papers in various reputed National/International Journals and conferences. She has been a mentor to various B. Tech and M. Tech projects. She has been a resource person in various FDPs, workshops, guest lectures, and chaired the session at various Conferences. She is editing books from the various publishers like Springer, CRC Press, etc. She is serving as a reviewer for many reputed Journals and TPC member for various International Conferences. She has also been involved in activities to improve the standard of the profession. For that, she has coordinated many events in collaboration with IIT Bombay, IIT Madras, and IIIT Delhi. She successfully organized TEDx 2017 and 2019 as a co-curator. She is leading a few chapters and societies in her current university, Institute of Engineers India (IEI) CSE chapter, Programmers Club, Alumni Sub-committee, and Open Web Application Software Project at the North Cap University, and many more. She is an active member of various global societies, such as the Open Web Application Software Project (OWASP), Optical Society of America (OSA), Women in Appsec (WIA), Cryptology Research Society of India (CRSI). Dr. Shilpa Mahajan has more than 14 years of teaching experience at postgraduate and undergraduate levels. She is a committed researcher in the field of sensor networks and has done her Ph.D. in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She completed her post-graduation with distinction from Punjab Engineering College, Chandigarh. She specializes in Cyber Security, Computer Networks, Data Structures, Operating Systems, and Mobile Computing. She has introduced and designed various courses like Network Security and Cyber Security. Presently two doctoral scholars are pursuing their Ph.D. under his supervision. She has guided various M. Tech and B. Tech Projects. She has published many research papers in peer-reviewed reputed international journals and conferences. She has been a resource person in various FDPs, workshops, guest lectures, and seminars. She is a CCNA certified instructor and has also done certifications in Data Scientist Tools, Exploratory Data Analysis, and Getting and Cleaning Data from Johns Hopkins University. She is a Lifetime member of ISTE. She is a CISCO-certified training instructor for CCNA modules 1, 2, 3, and 4. She has been appointed Advanced Level Instructor this year. She received an appreciation from Cisco Networking Academy for 5 years’ active participation. She also set up a CISCO Networking Academy and developed a CISCO lab at NCU, Gurgaon in January 2014.


Best Sellers


Product Details
  • ISBN-13: 9781000597561
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Chapman & Hall/CRC
  • Language: English
  • Sub Title: A Data Centric Approach to Information Security
  • ISBN-10: 1000597563
  • Publisher Date: 24 Jun 2022
  • Binding: Digital (delivered electronically)
  • Series Title: Chapman & Hall/CRC Cyber-Physical Systems


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)
Taylor & Francis Ltd -
Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security Analytics: A Data Centric Approach to Information Security(Chapman & Hall/CRC Cyber-Physical Systems)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!