• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Proceedings of International Ethical Hacking Conference 2018: Ehacon 2018, Kolkata, India » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Proceedings of International Ethical Hacking Conference 2018: Ehacon 2018, Kolkata, India

ISBN-13: 9789811315435 / Angielski / Miękka / 2018 / 506 str.

Mohuya Chakraborty; Satyajit Chakrabarti; Valentina Emilia Balas
Proceedings of International Ethical Hacking Conference 2018: Ehacon 2018, Kolkata, India Chakraborty, Mohuya 9789811315435 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Proceedings of International Ethical Hacking Conference 2018: Ehacon 2018, Kolkata, India

ISBN-13: 9789811315435 / Angielski / Miękka / 2018 / 506 str.

Mohuya Chakraborty; Satyajit Chakrabarti; Valentina Emilia Balas
cena 605,23 zł
(netto: 576,41 VAT:  5%)

Najniższa cena z 30 dni: 578,30 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

Kategorie:
Technologie
Kategorie BISAC:
Technology & Engineering > Telecommunications
Computers > Security - General
Computers > Information Theory
Wydawca:
Springer
Seria wydawnicza:
Advances in Intelligent Systems and Computing
Język:
Angielski
ISBN-13:
9789811315435
Rok wydania:
2018
Wydanie:
2019
Ilość stron:
506
Waga:
0.73 kg
Wymiary:
23.39 x 15.6 x 2.74
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Chapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM)

Chapter 2.OnlineKALI: Online Vulnerability Scanner
Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker
Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment
Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment
Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment
Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm
Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing
Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection
Chapter 10.Image Encryption using Pseudorandom Permutation
Chapter 11.Authentication of Diffie-Hellman Protocol against Man– in-the-Middle Attack Using Cryptographically Secure CRC
Chapter 12.Analysis on Data Hiding In Images Using Different Image Steganography Approaches
Chapter 13.Multiple RGB Image Steganography using Arnold and Discrete Cosine Transformation
Chapter 14.Brain-Computer Interface Based Fear Detection: A Self Defense Mechanism
Chapter 15.Modelling and Simulation of Proton Exchange Membrane Fuel Cell for Stand-Alone System
Chapter 16.Hardware Realization of Power Adaptation Technique for Cognitive Radio Sensor Node
Chapter 17.Driven by the need for a reliable and cost effective LED driver
Chapter 18.SGSQoT: A Community based Trust Management Scheme in Internet of Things
Chapter 19.A novel trust evaluation model based on data freshness in WBAN
Chapter 20.CREnS: A Convolutional Coder Based Encryption Algorithm for Tiny Embedded Cognitive Radio Sensor Node
Chapter 21.Bilingual machine translation: English to Bengali
Chapter 22.Comparison of Different Classification Techniques Using Different Datasets
Chapter 23.An Algorithmic Approach for Generating Quantum Ternary Superposition Operators and Related Performance Measures
Chapter 24.A Survey on Collaborative Filtering: Tasks, Approaches and Applications
Chapter 25.Feature subset selection of semi-supervised data: An Intuitionistic Fuzzy-Rough set based concept
Chapter 26.An efficient Indoor Occupancy Detection System using Artificial Neural Network
Chapter 27.Real-time Facial Recognition using Deep Learning and Local Binary Patterns
Chapter 28.Hepatocellular Carcinoma Survival Prediction Using Deep Neural Network
Chapter 29.Detection and Retrieval of colored object from a Live Video Stream with Mutual Information
Chapter 30.A Machine Learning Framework for Recognizing Hand Written Digits Using Convexity Based Feature Vector Encoding
Chapter 31.A Secure Framework for IoT-Based Healthcare System
Chapter 32.SMART IRRIGATION: IOT Based Irrigation Monitoring System
Chapter 33.Secure data transmission beyond Tier 1 of medical body sensor network
Chapter 34.Multi-Target Based Cursor Movement in Brain Computer Interface using CLIQUE Clustering
Chapter 35.Data Mining in High Performance Computing: A Survey of Related Algorithms
Chapter 36.Personalized Product Recommendation Using Aspect Based Opinion Mining of Reviews
Chapter 37.Quantitative Rainfall Prediction: Deep Neural Network based approach
Chapter 38.Prediction of Benzene Concentration of Air in Urban Area Using Deep Neural Network
Chapter 39.Rough Set Based Feature Subset Selection Technique using Jaccard's Similarity Index
Chapter 40.An Approach towards Development of a Predictive Model for Female Kidnapping in India using R Programming

Mohuya Chakraborty presently holds the post of professor and head of the department of Information Technology, Institute of Engineering & Management (IEM), Kolkata. She also holds the post of head of Human Resource Development Centre, IEM. She has done B.Tech and M. Tech from the Institute of Radio Physics and Electronics, Calcutta University in the year 1994 and 2000 respectively and PhD (Engg.) in the field of Mobile Computing from Jadavpur University in 2007. She is the recepient of prestigious Paresh Lal Dhar Bhowmik Award. She is the member of editorial board of several International journals. She has published 3 patents and over 80 research papers in reputed International journals and conferences. She has handled many research projects funded by the DST, AICTE, CSIR and NRDC, and has published a number of papers in high-impact journals. Her research areas include network security, cognitive radio, brain computer interface, parallel computing etc. She is a member of IEEE Communication Society, IEEE Computer Society and IEEE Computational Intelligence Society as well as the faculty adviser of IEEE Communication Society and IEEE Computational Intelligence Student Branch Chapters of IEM , Kolkata Section. 

Satyajit Chakrabarti is Pro-Vice Chancellor, University of Engineering & Management, Kolkata and Jaipur Campus, India and Director of Institute of Engineering & Management, IEM. As the Director of one of the most reputed organizations in Engineering & Management in Eastern India, he launched a PGDM Programme to run AICTE approved Management courses, Toppers Academy to train students for certificate courses, and Software Development in the field of ERP solutions. Dr. Chakrabarti was Project Manager in TELUS, Vancouver, Canada from February 2006 to September 2009, where he was intensively involved in planning, execution, monitoring, communicating with stakeholders, negotiating with vendors and cross-functional teams, and motivating members. He managed a team of 50 employees and projects with a combined budget of $3 million.

Valentina E. Balas is currently an Associate Professor at the Department of Automatics and Applied Software at the Faculty of Engineering, University “Aurel Vlaicu” Arad (Romania). She holds a PhD in Applied Electronics and Telecommunications from the Polytechnic University of Timisoara. She is the author of more than 160 research papers in refereed journals and international conferences. Her main research interests are in Intelligent Systems, Fuzzy Control, Soft Computing, Smart Sensors, Information Fusion, Modeling and Simulation. She is Editor-in-Chief of the International Journal of Advanced Intelligence Paradigms (IJAIP), an editorial board member of several national and international journals and an expert evaluator for various national and international projects. She is a member of EUSFLAT, ACM and the IEEE, TC – Fuzzy Systems (IEEE CIS), TC – Emergent Technologies (IEEE CIS), TC – Soft Computing (IEEE SMCS) and IFAC’s TC 3.2 – Computational Intelligence in Control.

J.K. Mandal received his M.Sc. in Physics from Jadavpur University, Kolkata, West Bengal in 1986 and his M.Tech. in Computer Science from the University of Calcutta. Prof. Mandal was awarded his Ph.D. in Computer Science and Engineering by the Jadavpur University in 2000. Presently, he is working as a Professor of Computer Science and Engineering and former Dean, Faculty of Engineering, Technology and Management at Kalyani University, Kalyani, Nadia, West Bengal for two consecutive terms. He started his career as a Lecturer at NERIST, Arunachal Pradesh in September 1988. With 28 years of teaching and research experience, his major research areas include coding theory, data and network security, remote sensing and GIS-based applications, data compression, error correction and visual cryptography. He has been a member of the Computer Society of India since 1992, CRSI since 2009, ACM since 2012, IEEE since 2013 and Fellow Member of IETE since 2012, as well as Honorary Chairman of the CSI Kolkata Chapter. He has chaired more than 30 sessions in various international conferences and delivered more than 50 expert/invited lectures in the past 5 years. He has acted as program chair for several international conferences and edited more than 15 volumes of proceedings from Springer Series, Science Direct etc. He is a reviewer of various international journals and conferences. He has over 360 articles and 6 published books to his credit.

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia