Cyber-vigilance and digital trust: cyber security in the era of cloud computing and IoT
Material type:
TextLanguage: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2019. Edition: 1st edDescription: x, 230pISBN: 9781119618379Subject(s): Cyber Threat Intelligence | Trust Management Systems --- a Retrospective Study on Digital Trust | Risk Analysis Linked to Network AttacksDDC classification: 005.8 Online resources: Click here to access online
| Item type | Current library | Call number | Status | Date due | Barcode |
|---|---|---|---|---|---|
| e-Books | Dr. S. R. Ranganathan Library Ebook (Online Access) | 005.8 (Online Access) (Browse shelf(Opens below)) | Available | EB0098 |
Browsing Dr. S. R. Ranganathan Library shelves, Shelving location: Ebook (Online Access) Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 (Online Access) Cyber mayday and the day after: A leader's guide to preparing, managing, and recovering from inevitable business disruptions | 005.8 (Online Access) Cyber operations: A case study approach | 005.8 (Online Access) Cyber security and network security | 005.8 (Online Access) Cyber-vigilance and digital trust: cyber security in the era of cloud computing and IoT | 005.8 (Online Access) Cybersecurity blue team toolkit | 005.8 (Online Access) Cybersecurity essentials | 005.8 (Online Access) Cybersecurity in humanities and social sciences: A research methods approach |
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead.
Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems