LEADER 04407nam 22006495 450 001 9910373902103321 005 20251124064901.0 010 $a3-030-19353-5 024 7 $a10.1007/978-3-030-19353-9 035 $a(CKB)4900000000504992 035 $a(DE-He213)978-3-030-19353-9 035 $a(MiAaPQ)EBC6017638 035 $a(PPN)24284765X 035 $a(EXLCZ)994900000000504992 100 $a20200106d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cyber Security Analytics and Decision Systems /$fedited by Shishir K. Shandilya, Neal Wagner, Atulya K. Nagar 205 $a1st ed. 2020. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2020. 215 $a1 online resource (XII, 145 p. 42 illus., 36 illus. in color.) 225 1 $aEAI/Springer Innovations in Communication and Computing,$x2522-8609 311 08$a3-030-19352-7 320 $aIncludes bibliographical references and index. 327 $aChapter 1. Introduction -- Chapter 2. Security Design -- Chapter 3. Authentication -- Chapter 4. Authorization -- Chapter 5. Cryptography -- Chapter 6. Virtualization -- Chapter 7. Security principles -- Chapter 8. Malware -- Chapter 9. SQL Injection -- Chapter 10. DoS -- Chapter 11. Worms -- Chapter 12. Virus -- Chapter 13. Malicious Code -- Chapter 14. Intrusion Detection Systems -- Chapter 15. Vulnerability -- Chapter 16. Cyber Laws -- Chapter 17. Cyber Crime -- Chapter 18. Homeland Security -- Chapter 19. Cryptocurrency -- Chapter 20. BitCoin -- Chapter 21. Block chain -- Chapter 22. Phishing -- Chapter 23. Spoofing -- Chapter 24. Cyber War -- Chapter 25. Hacktivism -- Chapter 26. Distributed Denial of Service (DDoS) -- Chapter 27. Identity Fraud -- Chapter 28. Honeypot -- Chapter 29. Keylogging -- Chapter 30. Scareware -- Chapter 31. Spam -- Chapter 32. Sponsored Attacks -- Chapter 33. Sneakernet -- Chapter 34. Virtual Militray Technologies -- Chapter 35. Zero Day -- Chapter 36. Intrusion prevention system (IPS) -- Chapter 37. Macro virus -- Chapter 38. Wannacry -- Chapter 39. Conclusion. 330 $aThis book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others. Focuses on current theory, research, and results on cyber security and analytics Presents a variety of practical applications of cyber security measures Chapters written by globalcyber security experts. 410 0$aEAI/Springer Innovations in Communication and Computing,$x2522-8609 606 $aTelecommunication 606 $aData protection 606 $aSecurity systems 606 $aComputer networks 606 $aCommunications Engineering, Networks 606 $aData and Information Security 606 $aSecurity Science and Technology 606 $aComputer Communication Networks 615 0$aTelecommunication. 615 0$aData protection. 615 0$aSecurity systems. 615 0$aComputer networks. 615 14$aCommunications Engineering, Networks. 615 24$aData and Information Security. 615 24$aSecurity Science and Technology. 615 24$aComputer Communication Networks. 676 $a621.3 702 $aShandilya$b Shishir K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWagner$b Neal$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNagar$b Atulya K$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910373902103321 996 $aAdvances in Cyber Security Analytics and Decision Systems$92507521 997 $aUNINA