Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Junaid Ahmed Zubairi (SUNY at Fredonia, USA) and Athar Mahboob (National University of Sciences & Technology, Pakistan)
Indexed In: SCOPUS
Release Date: August, 2011|Copyright: © 2012 |Pages: 336
DOI: 10.4018/978-1-60960-851-4
ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
Hardcover:
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$211.50
List Price: $235.00
10% Discount:-$23.50
TOTAL SAVINGS: $23.50
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Cyber security, encompassing both information and network security, is of utmost importance in today’s information age.

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners, and consultants in the area of social media, cyber security and information, and communication technologies (ICT).

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Botnet Phenomena
  • C4ISR
  • Cyber Attacks
  • Network-Based Anomaly Detection Systems
  • Photons
  • Quantum Cryptography
  • Remote Terminal Units (RTUs)
  • Supervisory Control and Data Acquisition (SCADA) System
  • Viruses, Worms, and Trojan Horses
  • Web Application Firewalls
Reviews & Statements

Cyber security has a long way to go, and covering the complete spectrum of this topic is a daunting task. We need not only to learn how to achieve it but also need to realize that it is essential to pursue it. [...] this book provides a balanced and comprehensive treatment to this vast topic. We expect the readers will greatly benefit from this book and practice the knowledge provided in it.

– Arif Ghafoor, Professor, Electrical and Computer Engineering, Purdue University, USA

This book explains convincingly the importance of securing wireless communication processes as well as their potential impact on network control. To improve the security system and enable the rapid identification of future threats, there are some interesting systems that are based on those significant anomalies. Authors contributing to this book present valuable outcomes respective to the problems entailed in the intrusion of new detection systems.[...] This title represents a work that very well stimulates the debate in those scholars concerned by cyber-terrorism and cyber-security.

– Maximiliano E. Korstanje, University of Palermo, Argentina
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Junaid Ahmed Zubairi is currently an Associate Professor at Department of Computer and Information Sciences in the State University of New York at Fredonia, USA. Dr. Zubairi received his BE (Electrical Engineering) from NED University of Engineering, Pakistan and MS and Ph.D. (Computer Engineering) from Syracuse University, USA. He worked in Sir Syed University Pakistan and Intl' Islamic University Malaysia before joining State University of New York at Fredonia. Dr. Zubairi is a recipient of many awards including Malaysian Government IRPA award, National Science Foundation MACS grant, SUNY Scholarly Incentive award, and SUNY individual development award. He has authored several chapters and scholarly articles in books, international journals, and conference proceedings. His research interests include information security, network traffic engineering, performance evaluation of networks, and network applications in medicine.
Athar Mahboob is an Associate Professor at the National University of Sciences & Technology, Pakistan. Dr. Athar Mahboob obtained a Ph.D. in Electrical Engineering from National University of Sciences & Technology, Pakistan in 2005. Earlier, he had obtained BS and MS degrees in Electrical Engineering both from Florida State University, USA (1988-1996). Dr. Athar Mahboob is a specialist in implementing enterprise information services using Linux, information security and cryptology, computer networks, and internetworking using TCP/IP protocols, digital systems design and computer architectures. Dr. Athar Mahboob's Ph.D. research was focused on “Efficient Hardware and Software Implementations of Elliptic Curve Cryptography,” an area in which he has obtained several international publications.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.
Editorial Advisory Board
  • Kassem Saleh, Kuwait University
  • Sajjad Madani, COMSATS Institute
  • Badar Hussain, KCI Engineering
  • Omer Mahmoud, International Islamic University