Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies
()
About this ebook
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book.
This important book cover subjects such as:
- Research and solutions for the problem of hidden image detection
- Security aspects of data mining and possible solution techniques
- A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
- Blockchain technology and how it is crucial to the security industry
- Security for the Internet of Things
- Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
- Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
- Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
- Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management
- Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
- Security issues in the healthcare sector with existing solutions and emerging threats.
Read more from Dac Nhuong Le
Cloud Computing and Virtualization Rating: 0 out of 5 stars0 ratingsDeep Learning for Healthcare Services Rating: 0 out of 5 stars0 ratings
Related to Cyber Security in Parallel and Distributed Computing
Related ebooks
A Comprehensive Guide to 5G Security Rating: 0 out of 5 stars0 ratingsSecurity, Privacy, and Digital Forensics in the Cloud Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsThe Official (ISC)2 Guide to the CCSP CBK Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsPervasive Computing and Networking Rating: 0 out of 5 stars0 ratingsManaging the Unknown: A New Approach to Managing High Uncertainty and Risk in Projects Rating: 2 out of 5 stars2/5Computer and Information Security Handbook Rating: 2 out of 5 stars2/5An Introduction to Cyber Modeling and Simulation Rating: 0 out of 5 stars0 ratingsEmerging Trends in ICT Security Rating: 0 out of 5 stars0 ratings(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsComputer Architecture and Security: Fundamentals of Designing Secure Computer Systems Rating: 0 out of 5 stars0 ratingsSSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsThe Cloud Security Ecosystem: Technical, Legal, Business and Management Issues Rating: 0 out of 5 stars0 ratingsArtificial Intelligence to Solve Pervasive Internet of Things Issues Rating: 0 out of 5 stars0 ratingsDistibuted Systems: Design and Algorithms Rating: 0 out of 5 stars0 ratingsHacking Connected Cars: Tactics, Techniques, and Procedures Rating: 0 out of 5 stars0 ratingsSoftware Networks: Virtualization, SDN, 5G and Security Rating: 0 out of 5 stars0 ratingsSystem Assurances: Modeling and Management Rating: 0 out of 5 stars0 ratingsSecurity Engineering: A Guide to Building Dependable Distributed Systems Rating: 4 out of 5 stars4/5Hardware Security: A Hands-on Learning Approach Rating: 0 out of 5 stars0 ratingsArtificial Intelligence and Machine Learning for EDGE Computing Rating: 0 out of 5 stars0 ratingsCybersecurity and Third-Party Risk: Third Party Threat Hunting Rating: 0 out of 5 stars0 ratingsRisk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Rating: 2 out of 5 stars2/5Information Assurance: Dependability and Security in Networked Systems Rating: 5 out of 5 stars5/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5
Computers For You
101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsStandard Deviations: Flawed Assumptions, Tortured Data, and Other Ways to Lie with Statistics Rating: 4 out of 5 stars4/5The Invisible Rainbow: A History of Electricity and Life Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5Elon Musk Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsAlan Turing: The Enigma: The Book That Inspired the Film The Imitation Game - Updated Edition Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Insider's Guide to Technical Writing Rating: 0 out of 5 stars0 ratingsCompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Summary of Max Tegmark's Life 3.0 Rating: 0 out of 5 stars0 ratingsMaster Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5
Reviews for Cyber Security in Parallel and Distributed Computing
0 ratings0 reviews