Case Studies in Secure Computing: Achievements and Trends (Hardcover)

Biju Issac, Nauman Israr

商品描述

In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.

This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:

  • Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection
  • Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples
  • Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks
  • Investigates various malicious activities associated with cloud computing and proposes some countermeasures
  • Examines current and emerging security threats in long-term evolution backhaul and core networks
  • Supplies a brief introduction to application-layer denial-of-service (DoS) attacks

Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.

This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.

商品描述(中文翻譯)

在今天的無線和移動計算時代,網絡和計算機安全至關重要。《安全計算案例研究:成就與趨勢》匯集了來自研究人員的最新研究成果,他們通過實例案例研究分享了自己的見解和最佳實踐。

本書探討了獨立和網絡世界中不斷增加的安全攻擊和對策,以及其他相關的安全問題。這些案例研究涵蓋了各種安全計算應用。通過研究計算機安全攻擊和防禦的共同要素,本書:

- 描述了在入侵檢測的決策樹模型中使用特徵選擇和模糊邏輯的應用
- 引入了一組基於模糊邏輯的常見安全風險估計技術,並提供了實例
- 提出了一種用於無線傳感器網絡的安全驗證多密鑰建立協議
- 調查了與雲計算相關的各種惡意活動,並提出了一些對策
- 檢查了長期演進回程和核心網絡中當前和新興的安全威脅
- 簡要介紹了應用層拒絕服務(DoS)攻擊

通過展示當前從業人員面臨的安全挑戰,本書提供了領先研究人員在該領域提出的強大安全解決方案。通過研究各種案例研究,有助於發展對未來安全威脅的實際理解,以保持一步之遙。

本書將幫助初入該領域的人了解如何減輕安全威脅。它還將幫助已經從事該領域的從業人員調整他們建立下一代計算系統強大而有彈性的安全性的方法。