Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems

Indexed In: SCOPUS
Release Date: February, 2019|Copyright: © 2019 |Pages: 334
DOI: 10.4018/978-1-5225-8241-0
ISBN13: 9781522582410|ISBN10: 152258241X|EISBN13: 9781522582427
Hardcover:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$225.00
TOTAL SAVINGS: $225.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$270.00
TOTAL SAVINGS: $270.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$1,500.00
TOTAL SAVINGS: $1,500.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

The rate of cybercrimes is increasing because of the fast-paced advancements in computer and internet technology. Crimes employing mobile devices, data embedding/mining systems, computers, network communications, or any malware impose a huge threat to data security.

Countering Cyber Attacks and Preserving the Integrity and Availability of Critical Systems addresses current problems and issues emerging in cyber forensics and investigations and proposes new solutions that can be adopted and implemented to counter security breaches within various organizations. The publication examines a variety of topics such as advanced techniques for forensic developments in computer and communication-link environments and legal perspectives including procedures for cyber investigations, standards, and policies. It is designed for policymakers, forensic analysts, technology developers, security administrators, academicians, researchers, and students.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Authentication
  • Civil Litigation
  • Cloud Forensics
  • Criminal Psychology
  • Criminology
  • Cyber Warfare
  • Digital Evidence
  • Digital Forensics
  • Encryptions
  • Incident Response
  • Law Enforcement
  • Machine Learning
  • Mobile Forensics
  • National Security
Table of Contents
Search this Book:
Reset
Editor/Author Biographies

S. Geetha received the B.E., from the Madurai Kamaraj University, M.E., and Ph.D. degrees in Computer Science and Engineering from Anna University, Chennai, in 2000, 2004 and 2011 respectively. She has 14+ years of teaching experience. Currently, she is a professor at School of Computing Science and Engineering at VIT-University, Chennai Campus. She has published more than 50 papers in reputed IEEE International Conferences and refereed Journals. She joins the review committee for IEEE Transactions on Information Forensics and Security and IEEE Transactions on Image Processing, Springer Multimedia Tools and Security, Elsevier – Information Sciences. She was an editor for the Indian Conference proceedings of ICCIIS 2007 and RISES-2013. Her research interests include multimedia security, intrusion detection systems, machine learning paradigms and information forensics. She is a recipient of University Rank and Academic Topper Award in B.E. and M.E. in 2000 and 2004 respectively. She is also a pride recipient of the “Best Academic Researcher Award 2013” of ASDF Global Awards.

Asnath Victy Phamila is an Associate Professor in School of Computing Science and Engineering, Vellore Institute of Technology, Chennai Campus, India. She holds M.E and Ph.D degree in Computer Science and Engineering from Anna University, India. Her research area includes Image Processing, Wireless Sensor Networks, Network Security and Deep Learning. She has around 15 years of academic and 4 years of industry experience. She is a recipient of proficiency award from Government of Tamil Nadu, Best Team Player award from Ramco Systems and research award from VIT. She has around 40 research papers to her credit. She also serves as reviewer in reputed journals.

Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.