000 | 03821cam a2200481Ii 4500 | ||
---|---|---|---|
001 | on1292744255 | ||
003 | OCoLC | ||
005 | 20220711203743.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 220120s2022 nju ob 001 0 eng d | ||
040 |
_aDG1 _beng _erda _epn _cDG1 _dOCLCO _dOCLCF _dOCLCO |
||
020 |
_a9781119795667 _q(electronic bk. : oBook) |
||
020 |
_a1119795664 _q(electronic bk. : oBook) |
||
024 | 7 |
_a10.1002/9781119795667 _2doi |
|
029 | 1 |
_aAU@ _b000070667753 |
|
035 | _a(OCoLC)1292744255 | ||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
245 | 0 | 0 |
_aCyber security and digital forensics / _cedited by Mangesh M. Ghonge [and more]. |
264 | 1 |
_aHoboken, NJ : _bWiley ; _aBeverly, MA : _bScrivener Publishing, _c2022. |
|
300 | _a1 online resource. | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aAdvances in cyber security | |
505 | 0 | _aA Comprehensive Study of Security Issues and Research Challenges in Different Layers of Service-Oriented IoT Architecture / Ankur O Bang, Udai Pratap Rao, Amit A Bhusari -- Quantum and Post-Quantum Cryptography / Om Pal, Manoj Jain, BK Murthy, Vinay Thakur -- Artificial Neural Network Applications in Analysis of Forensic Science / KR Padma, KR Don -- A Comprehensive Survey of Fully Homomorphic Encryption from Its Theory to Applications / Rashmi Salavi, M M Math, U P Kulkarni -- Understanding Robotics through Synthetic Psychology / Garima Saini, Shabnam -- An Insight into Digital Forensics: History, Frameworks, Types and Tools / G Maria Jones, S Godfrey Winster -- Digital Forensics as a Service: Analysis for Forensic Knowledge / Soumi Banerjee, Anita Patil, Dipti Jadhav, Gautam Borkar -- 4S Framework: A Practical CPS Design Security Assessment & Benchmarking Framework / Neel A Patel, Dhairya A Parekh, Yash A Shah, Ramchandra Mangrulkar -- Ensuring Secure Data Sharing in IoT Domains Using Blockchain / Tawseef Ahmed Teli, Rameez Yousuf, Dawood Ashraf Khan -- A Review of Face Analysis Techniques for Conventional and Forensic Applications / HT Chethana, Trisiladevi C Nagavi -- Roadmap of Digital Forensics Investigation Process with Discovery of Tools / Anita Patil, Soumi Banerjee, Dipti Jadhav, Gautam Borkar -- Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach / Kaushik Dushyant, Garg Muskan, Annu, Ankur Gupta, Sabyasachi Pramanik -- Applications of Machine Learning Techniques in the Realm of Cybersecurity / Koushal Kumar, Bhagwati Prasad Pande -- Security Improvement Technique for Distributed Control System (DCS) and Supervisory Control-Data Acquisition (SCADA) Using Blockchain at Dark Web Platform / Anand Singh Rajawat, Romil Rawat, Kanishk Barhanpurkar -- Recent Techniques for Exploitation and Protection of Common Malicious Inputs to Online Applications / Tun Myat Aung, Ni Ni Hla -- Ransomware: Threats, Identification and Prevention / Sweta Thakur, Sangita Chaudhari, Bharti Joshi. | |
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aOnline resource; title from PDF title page (John Wiley, viewed January 20, 2022). | |
650 | 0 |
_aComputer security. _93970 |
|
650 | 0 |
_aDigital forensic science. _94648 |
|
650 | 2 |
_aComputer Security _0(DNLM)D016494 _93970 |
|
650 | 6 |
_aSécurité informatique. _0(CaQQLa)201-0061152 _910568 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 _93970 |
|
650 | 7 |
_aDigital forensic science. _2fast _0(OCoLC)fst02000600 _94648 |
|
655 | 4 |
_aElectronic books. _93294 |
|
700 | 1 |
_aGhonge, Mangesh, _d1984- _eeditor. _910569 |
|
830 | 0 |
_aAdvances in cyber security. _910387 |
|
856 | 4 | 0 |
_uhttps://doi.org/10.1002/9781119795667 _zWiley Online Library |
942 | _cEBK | ||
994 |
_aC0 _bDG1 |
||
999 |
_c69751 _d69751 |