
Cyber Security in Parallel and Distributed Computing
Concepts, Techniques, Applications and Case Studies
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cyber Security in Parallel and Distributed Computing
Concepts, Techniques, Applications and Case Studies
About this book
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book.
Some of the important topics covered include:
- Research and solutions for the problem of hidden image detection
- Security aspects of data mining and possible solution techniques
- A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
- Blockchain technology and how it is crucial to the security industry
- Security for the Internet of Things
- Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
- Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
- Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
- Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
- Security issues in the healthcare sector with existing solutions and emerging threats.
Trusted by 375,005 students
Access to over 1 million titles for a fair monthly price.
Study more efficiently using our study tools.
Information
PART I
Cybersecurity Concept
Chapter 1
Introduction on Cybersecurity
Abstract
1.1 Introduction to Cybersecurity
- Critical infrastructure: Security in critical infrastructure deals with cyber physical systems and real-world deployments. Industries like automation, aviation, healthcare, traffic lights, electricity grids etc are prone to cyberattacks like eavesdropping, compromised key attacks, man-in-the-middle attacks and denial-of-service attacks [2].
- Network security: Network security deals with measures and concerns to protect information systems. It guards against unauthorized intrusions and protects the usability and integrity of network and data. cyberattacks on networks could be passi...
Table of contents
- Cover
- Title page
- Copyright page
- Dedication
- List of Figures
- List of Tables
- Foreword
- Preface
- Acknowledgement
- Acronyms
- Part I: Cybersecurity Concept
- Part II: Cybersecurity in Parallel and Distributed Computing Techniques
- Part III: Cybersecurity Applications and Case Studies
- End User License Agreement
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app