Overview
- Discusses the different third-party attacks and hacking processe
- Maximizes reader insights into effective cyber security, malware, firewalls and cryptography
- Simplifies a complicated picture into hacking and penetration testing
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (19 chapters)
Keywords
About this book
This textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach.
Authors and Affiliations
About the authors
Dr. Gunasekaran Manogaran received the B.E. degree in computer science from Anna University, Chennai, Tamil Nadu, India, in 2010, and the M.Tech. and Ph.D. degrees in information technology from Vellore Institute of Technology, Vellore, Tamil Nadu, India, in 2012 and 2017, respectively., He is currently working as a Visiting Researcher in Computer and Information Science Department, Gannon University, Erie, USA. He was worked as a Big Data Scientist with the University of California, Davis, CA, USA. He has worked as a Research Assistant for a project on spatial data mining funded by the Indian Council of Medical Research, Government of India. He has authored/coauthored papers in conferences, book chapters, and journals. His current research interests include data mining, big data analytics, and soft computing. Dr. Manogaran is a member of the International Society for Infectious Diseases and Machine Intelligence Research labs. He is on the reviewer board of several international journals and has been a member of the Program Committee for several international/national conferences and workshops. He is a Co-Investigator for the project entitled Agent Based Modeling of HIV epidemic in state of Telangana, India¡± funded by Pitt Public Health, Pittsburgh University, USA. He currently serves on Technical Program Committee for 2018 IEEE International Conference on Consumer Electronics (ICCE) in Las Vegas, USA. He is the Guest Editor for various international journals including IEEE, Springer, Elsevier, Intercedence, IGI, Taylor Francis and Emerald publishing. He is the recipient of an award for Young Investigator from India and Southeast Asia by Bill and Melinda Gates Foundation, USA.
Dr. Alexander Peter is an award-winning hands-on Senior Executive and Board Member with more than 20 years of success ac^ understand wisdom (unsupervised). Leveraging extensive experience in big data management and intelligent process optimization/automation, he is a valuable advisor for an organization looking to develop their KPI, scorecards, and/or executive dashboard. His broad areas of expertise include business intelligence, artificial intelligence, data management/engineering, cloud/mobile computing and Cryptocurrency/Blockchain, managing Bitcoin, and Ethereum smart contract mining hardware using over 1 Ph/s - 1000 Trillion Hashes per second infrastructure.
Bibliographic Information
Book Title: Cybersecurity and Identity Access Management
Authors: Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter
DOI: https://doi.org/10.1007/978-981-19-2658-7
Publisher: Springer Singapore
eBook Packages: Engineering, Engineering (R0)
Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023
Hardcover ISBN: 978-981-19-2657-0Published: 29 June 2022
Softcover ISBN: 978-981-19-2660-0Published: 30 June 2023
eBook ISBN: 978-981-19-2658-7Published: 28 June 2022
Edition Number: 1
Number of Pages: X, 236
Number of Illustrations: 7 b/w illustrations, 79 illustrations in colour
Topics: Communications Engineering, Networks, Mobile and Network Security, Crime Control and Security, Systems and Data Security