Advanced smart computing technologies in cybersecurity and forensics / (Record no. 83051)

000 -LEADER
fixed length control field 06313cam a2200577Ki 4500
001 - CONTROL NUMBER
control field 9781003140023
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230516170548.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211007s2021 xx o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003140023
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003140025
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367690137
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000520613
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000520617
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000520590
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000520595
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367686505
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1273728263
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1273728263
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 059000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code URH
Source bicssc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23/eng/20211007
245 00 - TITLE STATEMENT
Title Advanced smart computing technologies in cybersecurity and forensics /
Statement of responsibility, etc. edited by Keshav Kaushik, Shubham Tayal, Akashdeep Bhardwaj, and Manoj Kumar.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Place of publication not identified] :
Name of producer, publisher, distributor, manufacturer CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xvi, 248 pages).
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Detection of Cross-Site Scripting and Phishing Website Vulnerabilities Using Machine Learning.J. Charu, S. Sunil, and C. Aarti2. A Review: Security and Privacy Defensive Techniques for Cyber Security Using Deep Neural Networks (DNNs).Prachi Chauhan, Hardwari Lal Mandoria, andAlok Negi3. DNA-Based Cryptosystem for Connected Objects and IoT Security.Brahim Belhorma, Mounir Bouhedda, Billel Bengherbia, and Omar Benzineb4. A Role of Digital Evidence: Mobile Forensics Data.G. Maria Jones, S. Godfrey Winster, and L. Ancy Geoferla5. Analysis of Kernel Vulnerabilities Using Machine Learning. Supriya Raheja, Rakesh Garg, andBhavya Gururani6. Cyber Threat Exploitation and Growth during COVID-19 Times.Romil Rawat, Bhagwati Garg, Vinod Mahor, Mukesh Chouhan, Kiran Pachlasiya, and Shrikant Telang7. An Overview of the Cybersecurity in Smart Cities in the Modern Digital Age.Reinaldo Padilha França, Ana Carolina Borges Monteiro, Rangel Arthur, and Yuzo Iano8. The Fundamentals and Potential for Cyber Security of Machine Learning in the Modern World. Ana Carolina Borges Monteiro, Reinaldo Padilha França, Rangel Arthur, and Yuzo Iano9. Qualitative and Quantitative Evaluation of Encryption Algorithms.Rakesh Garg, Supriya Raheja, and Durgesh Pandey10. Analysis and Investigation of Advanced Malware Forensics.P. S. Apirajitha, S. Punitha, and Stephan Thompson11. Network Intrusion Detection System Using Naïve Bayes Classification Technique for Anomaly Detection.Sam Goundar,Manveer Singh,Rahul Chand, andAkashdeep Bhardwaj12. Data Security Analysis in Mobile Cloud Computing for Cyber Security.Sam Goundar andAkashdeep Bhardwaj13. AComprehensive Review of Investigations of Suspects of Cyber Crimes. Joshua Nehinbe Ojo14. Fault Analysis Techniques in Lightweight Ciphers for IoT Devices.Priyanka Joshi andBodhisatwa Mazumdar
520 ## - SUMMARY, ETC.
Summary, etc. This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first objective is to learn and understand the need for and impact of advanced cybersecurity and forensics and its implementation with multiple smart computational technologies. This objective answers why and how cybersecurity and forensics have evolved as one of the most promising and widely-accepted technologies globally and has widely-accepted applications. The second objective is to learn how to use advanced cybersecurity and forensics practices to answer many computational problems where confidentiality, integrity, and availability are essential aspects to handle and answer. This book is structured in such a way so that the field of study is relevant to each reader's major or interests. It aims to help each reader see the relevance of cybersecurity and forensics to their career or interests. This book intends to encourage researchers to develop novel theories to enrich their scholarly knowledge to achieve sustainable development and foster sustainability. Readers will gain valuable knowledge and insights about smart computing technologies using this exciting book. This book: " Includes detailed applications of cybersecurity and forensics for real-life problems " Addresses the challenges and solutions related to implementing cybersecurity in multiple domains of smart computational technologies " Includes the latest trends and areas of research in cybersecurity and forensics " Offers both quantitative and qualitative assessments of the topics Includes case studies that will be helpful for the researchers Prof. Keshav Kaushik is Assistant Professor in the Department of Systemics, School of Computer Science at the University of Petroleum and Energy Studies, Dehradun, India. Dr. Shubham Tayal is Assistant Professor at SR University, Warangal. Dr. Akashdeep Bhardwaj is Professor (Cyber Security & Digital Forensics) at the University of Petroleum & Energy Studies (UPES), Dehradun, India. Dr. Manoj Kumar is Assistant Professor (SG) (SoCS) at the University of Petroleum and Energy Studies, Dehradun.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh
9 (RLIN) 6769
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Engineering
Source of heading or term bisacsh
9 (RLIN) 4770
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Cryptography
Source of heading or term bisacsh
9 (RLIN) 10825
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 3970
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Investigation.
9 (RLIN) 5585
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kaushik, Keshav,
Relator term editor.
9 (RLIN) 71522
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tayal, Shubham,
Relator term editor.
9 (RLIN) 71523
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bhardwaj, Akashdeep,
Dates associated with a name 1971-
Relator term editor.
9 (RLIN) 71524
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kumar, Manoj
Titles and other words associated with a name (Professor of computer science),
Relator term editor.
9 (RLIN) 71525
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Taylor & Francis
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003140023">https://www.taylorfrancis.com/books/9781003140023</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks

No items available.