Information security handbook / edited by Noor Zaman Jhanjhi, Khalid Hussain, Azween Bin Abdullah, Mamoona Humayun, and João Manuel R.S. Tavares.
"This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together in one resource Information security across multiple domains. Information Secur...
Saved in:
Online Access: |
Full Text (via O'Reilly/Safari) |
---|---|
Other Authors: | , , , , |
Format: | eBook |
Language: | English |
Published: |
Boca Raton, FL :
CRC Press,
2022.
|
Edition: | First edition. |
Series: | Internet of everything (IoE). Security and privacy paradigm.
|
Subjects: |
Table of Contents:
- 1. Information Security Introduction. 2. History and Background of IS. 3. Security in Personal Computers. 4. Security in Gadgets. 5. Banking Threats and Counter Measures. 6. Cryptocurrencies Threats and Counter Measures. 7. Blockchain Security Issues. 8. Power plant Systems Threats and Counter Measures. 9. Security in Avionics Systems. 10. Big Data and Security Issues. 11. Security in Cloud Computing. 12. Clusters Security. 13. Information Security in the Modern Enterprise. 14. Information Security in IIoT. 15. Building a Secure Organization. 16. Detecting System Intrusions. 17. Preventing System Intrusions. 18. Guarding Against Network Intrusions. 19. Information Security in Industry 4.0. 20. Securing Web Applications, Services and Servers. 21. Internet Security. 22. The Botnet Issues. 23. Intranet Security Issues. 24. Wireless Network Security. 25. Wireless Body Area Security. 26. Wireless Sensor Network Security. 27. Security for the Internet of Things. 28. Information Security of E-Health Applications. 29. Cellular Network Security. 30. Security Risk Management. 31. Information Security Essentials for IT Professionals. 32. Protecting and or safeguarding Mission-Critical Systems. 33. Security Management Systems (SMS). 34. Information Security in Fog Cloud. 35. Private Cloud Security. 36. Virtual Private Cloud Security. 37. Protecting Virtual Infrastructure. 38. SDN and NFV Security. 39. Cyber-Physical Systems Security. 40. Penetration Testing. 41. Access Controls. 42. Endpoint Security. 43. Securing the Infrastructure. 44. Cyber Warfare.