Securing the digital realm : advances in hardware and software security, communication, and forensics / edited by Muhammad Arif, M. Arfan Jaffar, Oana Geman, Waseem Abbasi
Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Boca Raton : CRC Press, 2025Edition: First editionDescription: 1 Online-RessourceISBN:- 9781040183977
- 1040183972
- 9781040183984
- 1040183980
- 005.7 23/eng/20250219
- QA76.9.A25
Contents:
Summary: "This book "Securing the Digital Realm: Advances in Hardware and Software Security, Communication, and Forensics" is a comprehensive guide that explores the intricate world of digital security and forensics. As our lives become increasingly digital, understanding how to protect our digital assets, communication systems, and investigate cybercrimes is more crucial than ever. This book begins by laying a strong foundation in the fundamental concepts of hardware and software security. It explains the design of modern computer systems and networks to defend against a myriad of threats, from malware to data breaches, in clear and accessible language. One of the standout features of this book is its coverage of cutting-edge technologies like blockchain, artificial intelligence, and machine learning. It demonstrates how these innovations are used to enhance digital security and combat evolving threats"--PPN: PPN: 1940046041Package identifier: Produktsigel: ZDB-4-NLEBK | BSZ-4-NLEBK-KAUB
Performance analysis of PSK based advanced modulation formats for free space optical communication system / Sannia Bibi, M. Iram Baig and Farhan Qamar -- Volatile kernel rootkit hidden process detection view (VKRHPDV) approach for detection of malware in cloud computing environments / Danish, Hinna Hafeez, Farrah Taj and Zaib un Nisa -- Privacy preserved federated learning with optimized differential privacy (FLODP) / Maria Iqbal, Asadullah Tariq, Muhammad Adnan, Irfan Ud Din, and Tariq Qayyum -- Cyber physical systems having nodes/layers with trustworthy data : a review / Muhammad Ejaz Ul Ghaffar, Muhammad Arif, Arfan Jaffar and Ahmed Hassan -- Analysis of device-to-device communication in IOT system / Usman Nawaz, Faisal Rehman, Kainat Azmat Ullah, Usman Ahmed Raza, Hanan Sharif, Furqan Rafique, Abid Ali, Masood Ashiq and Junaid Iqbal -- Design and implementation of an on-board system for a spider robot / Nasir Nauman, Hirra Mustafa, Abrar Ashraf and Hisham Khalil -- Revolutionizing underwater sensor networks : a novel routing approach for efficient data collection with atom-inspired design / Muhammad Ahmad Pasha, Fatima Ijaz, Aleema Imran and Ahmad Shaf -- Extending WSN lifetime with cluster head election / Noroze Fatima, Danish Shehzad, Ali Imran, Ahsan Imtiaz and M. Arif -- A Parametric analysis of routing protocols in wireless sensor networks / Sajjad Abbas, Danish Irfan, M. Arfan Jaffar, Syed Asad Ali Naqvi, Naveed Ali Khan Kaim Khani and Muhammad Yousaf -- Implementation of IoT and WSN technologies for health monitoring / Tehseen Mazhar, Muhammad Iqbal, Muhammad Iqbal, Yazeed Yasin Ghadi, Ateeq Ur Rehman and Waseem Abbasi -- A survey on approximate hardware accelerator for error-tolerant applications / Sahibzada M. Waqas, Muhammad Zakwan, Muhammad Ashraf, Ghadah Naif AlWakid and Mamoona Humayun -- Virtual memory management techniques / Hajira Noor, Hamayun Khan, Irfan Ud din, Muhammad Imran Tarq, Muhammad Nabeel Amin and Mehak Fatima -- A comprehensive survey on software defined networking (SDN) security / Nouman Mabood, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- Access control techniques for cloud computing : review and recommendations / Mannan Javed, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- A jurisprudence for Pakistan's digital forensic investigation framework regarding cybersecurity / Ehtisham Ul Haque and Waseem Abbasi -- LockPath : logic locking technique based on longest path constraint for hardware security / Muhammad Younas, Haroon Waris, Ahsan Iqbal, Waqar Ahmad, Muhammad Yasir Qadri and Arif Zafar -- A review of the various methods of communication used in ad hoc networks / Ahmed Hassan, Muhammad Arif, Arfan Jaffer and Muhammad Ejazulghaffar -- Authentication of user data for enhancing privacy in cloud computing using security algorithms / Rashid Ali, Hamayun Khan, Muhammad Waleed Arif, Muhammad Imran Tariq, Irfan Ud din, Amna Afzal and Muhammad Azam Khan -- Big data issues in mobile cloud computing / Muhammad Jameel, Muhammad Waqas Nasir, Moodser Hussain, Naseer Ahmad, Mubasher Khalid, Taimoor Hassan Jabbar and Muhammad Waseem -- A comprehensive review on the role of blockchain in reinforcing security for industrial IoT / Shehla Afzal, Muhammad Ameer Hamza, Danish Shehzad, Irfan Ud Din, Muhammad Arif and Arfan Arshad -- Design & implementation role of middleware in shared network environments : a systematic review / Muddassar Ali, Hamayun Khan, Irfan Ud Din, Muhammad Imran Tariq and Aetsam Javed -- Challenges & frameworks in cloud security governance : a review / Farah Taj, Danish Shahzad, Faiqa Irum, Hinna Arqam and Zaib un Nisa -- LTE/Wi-Fi coexistence in unlicensed band / Irfan ud Din, Fatima Zahid, Uns Bin Younas, H. Umar Farooq and Ommair Hameed -- Evolution of next-generation firewall system for secure networks / Asim Noor, Noshina Tariq, Farrukh Aslam Khan and Muhammad Ashraf -- Security and performance comparison of Windows and Linux : a systematic literature review / Johar Mumtaz, Attiq ur Rehman, Hamayun Khan, Irfan Uddin and Imran Tariq
No physical items for this record
Anmerkungen zur Barrierefreiheit: "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025.