Computer and Cyber Security

Regular price €59.99
Quantity:
Ships in 10-20 days
Delivery/Collection within 10-20 working days
Shipping & Delivery
ABE
Ad Hoc Network
advanced cybersecurity threat modeling
Ai
Attack Graph
biometric authentication
Category=PD
Category=UL
Category=UR
Category=UTF
Cloud Computing
Cloud Platform
Cloud Services
computer security
critical infrastructure protection
cyber security
DDoS Attack
econometric risk analysis
eq_bestseller
eq_computing
eq_isMigrated=1
eq_isMigrated=2
eq_nobargain
eq_non-fiction
eq_science
Galois Field GF
genetic algorithm
He
homomorphic encryption
ICMP
IoT Device
Malicious Node
Malicious Scripts
MANETs
MCC
Microsoft SDL
mobile device security
Public Key
Public Key Cryptography
Routing Protocols
Secret Key
Sensitive Information
social engineering
Software Defined Networking
Trust Value
Virtual Machine
Web Applications
wireless sensor networks

Product details

  • ISBN 9780367656911
  • Weight: 453g
  • Dimensions: 178 x 254mm
  • Publication Date: 30 Sep 2020
  • Publisher: Taylor & Francis Ltd
  • Publication City/Country: GB
  • Product Form: Paperback
Secure checkout Fast Shipping Easy returns

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.

B. B. Gupta is an Assistant Professor in the Department of Computer Engineering, National Institute of Technology Kurukshetra India. His research interest includes information security, cyber security, mobile/smartphone, Cloud computing, Web security, intrusion detection, computer networks and phishing.