Search

Browse Subject Areas

For Authors

Submit a Proposal

Cyber Security in Parallel and Distributed Computing

Concepts, Techniques, Applications and Case Studies
Edited by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjeeand Manju Khari
Copyright: 2019   |   Status: Published
ISBN: 9781119488057  |  Hardcover  |  
290 pages
Price: $225 USD
Add To Cart

One Line Description
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing.

Audience
This book is aimed principally at data engineers and computer scientists working on massive datasets and cyber technologies. Technology managers in a variety of industrial and governmental settings, as well as cyber security experts and analysts, will find this book important to study.

Description
The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book.
Some of the important topics covered include:
• Research and solutions for the problem of hidden image detection
• Security aspects of data mining and possible solution techniques
• A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner
• Blockchain technology and how it is crucial to the security industry
• Security for the Internet of Things
• Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc.
• Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security
• Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations
• Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms
• Security issues in the healthcare sector with existing solutions and emerging threats.

Back to Top
Author / Editor Details
Dac-Nhuong Le obtained his PhD in computer science from Vietnam National University, Vietnam in 2015. He is Deputy-Head of Faculty of Information Technology, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedicine. He has authored 4 computer science books and has multiple research articles in international journals.

Raghvendra Kumar completed his PhD in the Faculty of Engineering and Technology, Jodhpur National University, India. He has authored several research papers in Scopus indexed and impact factor research journals\international conferences as well as 6 authored and 9 edited books on computer science. His areas of interest include wireless sensor network (WSN), Internet of Things, mobile application programming, ad hoc networks, cloud computing, big data, mobile computing, data mining and software engineering.

Brojo Kishore Mishra is an Associate Professor at the C. V. Raman College of Engineering (Autonomous), Bhubaneswar, India. He received his PhD degree in Computer Science from the Berhampur University in 2012. He has published more than 40 research papers in peer-reviewed journals. His research interests include data mining and big data analysis, machine learning, soft computing, and evolutionary computation.

Jyotir Moy Chatterjee is working as an Assistant Professor in the Department of Computer Science and Engineering at GD-RCET, Bhilai, C.G, India. He received his M.Tech from KIIT University, Bhubaneswar, Odisha and B.Tech in Computer Science & Engineering from Dr. MGR Educational & Research Institute University, Chennai, (Tamil Nadu). His research interests include cloud computing, big data, privacy preservation and data mining.

Manju Khari is an Assistant Professor at the Ambedkar Institute of Advanced Communication Technology and Research, Delhi, India. She holds a PhD in Computer Science & Engineering from the National Institute of Technology Patna. She has published 60 papers in refereed national and international journals and conferences. Her research interests are in software testing, software quality, software metrics, information security and nature-inspired algorithms.

Back to Top

Table of Contents
Foreword
Preface
Acknowledgments
Acronyms
Part 1 Cybersecurity Concept
1 Introduction to Cybersecurity
Ishaani Priyadarshini
2 Steganography and Steganalysis
Ho Thi Huong Thom and Nguyen Kim Anh
3 Security Threats and Vulnerabilities in E-business
Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das
4 e-Commerce Security: Th reats, Issues, and Methods
Prerna Sharma, Deepak Gupta, Ashish Khanna
5 Cyberwar is Coming
T. Manikandan, B. Balamurugan, C. Senthilkumar, R. Rajesh Alias Harinarayan, R. Raja Subramanian
Part 2 Cybersecurity in Parallel and Distributed Computing Techniques
6 Introduction to Blockchain Technology
Ishaani Priyadarshini
7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations
Soumitra Ghosh, Anjana Mishra, Brojo Kishore Mishra
8 Distributed Computing Security: Issues and Challenges
Munmun Saha, Sanjaya Kumar Panda and Suvasini Panigrahi
9 Organization Assignment in Federated Cloud Environments based on Multi-Target Optimization of Security
Abhishek Kumar, Palvadi Srinivas Kumar, T.V.M. Sairam
10 An On-Demand and User-friendly Framework for Cloud Data Centre Networks with Performance Guarantee
P. Srinivas Kumar, Abhishek Kumar, Pramod Singh Rathore, Jyotir Moy Chatterjee
Part 3 Cybersecurity Applications and Case Studies
11 Cybersecurity at Organizations: A Delphi Pilot Study of Expert Opinions About Policy and Protection
Holly Reitmeier, Jolanda Tromp, John Bottoms
12 Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention
Saurabh Ranjan Srivastava, Sachin Dube, Gulshan Shrivastava, Kavita Sharma
13 Cybersecurity: A Practical Strategy Against Cyber Threats, Risks with Real World Usages
Anjana Mishra, Soumitra Ghosh, Brojo Kishore Mishra
14 Security in Distributed Operating System: A Comprehensive Study
Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab, Brojo Kishore Mishra
15 Security in Healthcare Applications based on Fog and Cloud Computing
Rojalina Priyadarshini, Mohit Ranjan Panda, Brojo Kishore Mishra
16 Mapping of e-Wallets with Features
Alisha Sikri, Surjeet Dalal, N.P Singh, Dac-Nhuong Le.

Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page