Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security Applications
  • Language: en
  • Pages: 337

Information Security Applications

  • Type: Book
  • -
  • Published: 2018-06-22
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Information Security Applications, WISA 2017, held on Jeju Island, Korea, in August 2017.The 12 revised full papers and 15 short papers presented in this volume were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections such as attack and defense; theory in security; web security and emerging technologies; systems security and authentication; crypto protocols; and attack detections and legal aspects.

Distributed Computing
  • Language: en
  • Pages: 477

Distributed Computing

This book constitutes the refereed proceedings of the 18th International Conference on Distributed Computing, DISC 2004, held in Amsterdam, The Netherlands, in October 2004. The 31 revised full papers presented together with an extended abstract of an invited lecture and an eulogy for Peter Ruzicka were carefully reviewed and selected from 142 submissions. The entire scope of current issues in distributed computing is addressed, ranging from foundational and theoretical topics to algorithms and systems issues to applications in various fields.

Markets for Cybercrime Tools and Stolen Data
  • Language: en
  • Pages: 91

Markets for Cybercrime Tools and Stolen Data

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.

Security and Privacy in Communication Networks
  • Language: en
  • Pages: 617

Security and Privacy in Communication Networks

  • Type: Book
  • -
  • Published: 2018-12-28
  • -
  • Publisher: Springer

This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.

Detecting Peripheral-based Attacks on the Host Memory
  • Language: en
  • Pages: 118

Detecting Peripheral-based Attacks on the Host Memory

  • Type: Book
  • -
  • Published: 2014-12-27
  • -
  • Publisher: Springer

This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...

Advances in Information and Intelligent Systems
  • Language: en
  • Pages: 353

Advances in Information and Intelligent Systems

The College of Computing and Informatics (CCI) at UNC-Charlotte has three departments: Computer Science, Software and Information Systems, and Bioinformatics and Genomics. The Department of Computer Science offers study in a variety of specialized computing areas such as database design, knowledge systems, computer graphics, artificial intelligence, computer networks, game design, visualization, computer vision, and virtual reality. The Department of Software and Information Systems is primarily focused on the study of technologies and methodologies for information system architecture, design, implementation, integration, and management with particular emphasis on system security. The Depart...

Malicious Bots
  • Language: en
  • Pages: 170

Malicious Bots

  • Type: Book
  • -
  • Published: 2008-08-06
  • -
  • Publisher: CRC Press

Originally designed as neutral entities, computerized bots are increasingly being used maliciously by online criminals in mass spamming events, fraud, extortion, identity theft, and software theft. Malicious Bots: An Inside Look into the Cyber-Criminal Underground of the Internet explores the rise of dangerous bots and exposes the nefarious methods of "botmasters". This valuable resource assists information security managers in understanding the scope, sophistication, and criminal uses of bots. With sufficient technical detail to empower IT professionals, this volume provides in-depth coverage of the top bot attacks against financial and government networks over the last several years. The b...

Understanding Analog Side Channels Using Cryptography Algorithms
  • Language: en
  • Pages: 474

Understanding Analog Side Channels Using Cryptography Algorithms

This book offers the latest research results on analog side channels and their usage in cybersecurity. It demystifies analog side channels and demonstrates new use cases for them. The first part of this book discusses how analog side channels are generated, the physics behind it, the modeling and measurements of analog side channels, and their analogies to wireless communication systems. The second part of this book introduces new applications that benefit from leveraging side channels. In addition to breaking cryptography algorithms, it demonstrates how analog side channels can be used for malware detection, program profiling, hardware profiling, hardware/software attestation, hardware iden...

Botnet Detection
  • Language: en
  • Pages: 178

Botnet Detection

Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat. Botnet Detection: Countering the Largest Security Threat consists of chapters contributed by world-class leaders in this field, from the June 2006 ARO workshop on Botnets. This edited volume represents the state-of-the-art in research on Botnets.

Blockchain Adoption in Supply Chain Management and Logistics
  • Language: en
  • Pages: 182

Blockchain Adoption in Supply Chain Management and Logistics

  • Type: Book
  • -
  • Published: 2022-12-08
  • -
  • Publisher: tredition

Blockchain is an emerging technology concept that could be a tool to solve end-to-end integration of material and information flow in supply chain and logistics (SC&L). In this book, you can find three complementary studies on the adoption of Blockchain solutions in SC&L: (1) an analysis of existing use cases in the literature, (2) a 153-response survey outlining expectations for Blockchain in SC&L, and (3) an exploratory, qualitative Grounded Theory study that derives observations on adoption motivations, paths, barriers, and learnings. Blockchain solutions could become a valuable infrastructure tool for SC&L aligning supply chain partners worldwide.