Don't Ever Think About Passwords Again
Passwords have been an integral part of people's lives. Yet passwords are insecure and allow cybercriminals to attack businesses and their users. However, replacing passwords widely with better authentication methods wasn't practical.
Today, businesses of all sizes can eliminate passwords and introduce a more secure authentication using biometrics and passkeys. This short yet insightful eBook guides business leaders about how they can reduce reliance on passwords and fortify their cyber defenses.
Release Date: Nov 2022
Data Privacy - What Enterprises Need to Know?
“Data is the new oil” — it has become a cliché now: any enterprise today understands that data is not just an opportunity; managing data is almost how managing a business is. The success of tech companies that tailor solutions to meet consumer needs and alleviate pain points demonstrates the power of data and the modern data economy.
Collecting data ethically is just the first step. To succeed in the data economy, the collected data has to be processed in ways that unlock business value and growth opportunities. Whether early or late movers, any organization can build consumer trust and gain decisive advantages with better technological approaches and business strategies.
Release Date: July 2022
Data Mining Approaches for Big Data and Sentiment Analysis in Social Media
Social media sites are constantly evolving with huge amounts of scattered data or big data, which makes it difficult for researchers to trace the information flow. Data Mining Approaches for Big Data and Sentiment Analysis in Social Media encourages researchers to explore the key concepts of data mining, such as how they can be utilized on online social media platforms and provides advances on data mining for big data and sentiment analysis in online social media, as well as future research directions. Covering a range of concepts from machine learning methods to data mining for big data analytics, this book is ideal for graduate students, academicians, faculty members, scientists, researchers, data analysts, social media analysts, managers, and software developers who are seeking to learn and carry out research in the area of data mining for big data and sentiment.
Release Date: December 2021
Power of Digital Identity
Winning Consumer Trust and Transforming Experience
The world is going digital to deliver things and services in moments instead of days. Digital identities have become the foundation of consumer-brand relationships. And, Trust and Experience are the pillar of modern digital relationships i.e. consumers expect amazing and secure digital experiences where privacy is protected.
It is a strategy book for c-suite to understand the role of digital identity in consumer relationships and build the kind of CIAM strategy that drives growth.
Method and system for defense against Distributed Denial-of-Service attack
The present disclosure relates to a method for defense mechanisms against DDoS attack based on entropy in software defined network cloud. The present disclosure also relates to a defensive mechanism for DDoS attacks that is based on variations in entropy between DDoS attack and a normal traffic with a low computational overhead and a mitigation technique to reduce the severity of the attack. On comparing with the existing DDoS mechanisms, there are three advantages of the proposed method and those advantages are, detection rate is high, false positive rate is low, and the mitigation ability. Simulations are carried out in mininet emulator with POX controller and open flow switches at different attack strength.
Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network
The present disclosure relates to an existing attribute-based keyword search method with constant-size secret keys and ciphertexts. The method consists of a system and the system comprises of a trusted authority (TA), a data owner, a data use, and a cloud server. The present disclosure proposes a searchable encryption scheme based on ABE in which access control is used to determine the searching capability of a user. The scheme provides constant size for the user's secret key and ciphertext of the keyword. The scheme supports fast search as the number of pairing operations are constant. The scheme used a ciphertext-policy (CP) design framework and supports an AND gate access structure. Further, the proposed CP-ABKS scheme is secure in the selective security model under augmented multi-sequence of exponents decisional DiffieHellman assumption.
Handbook of Computer Networks and Cyber Security - Principles and Paradigms
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented.
Handbook of Research on Multimedia Cyber Security
The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.
Recent Advances on Deep Learning for Safety and Security of Multimedia Data in the Critical Infrastructure
There are some systems and networks that make up the infrastructure of society. Some of these infrastructures are of utmost importance and are related to each other. If one of these is critically damaged, then it can cause huge disturbances and losses for a nation. These are known as critical infrastructures.
This Special Issue mainly focuses on deep learning for the safety and security of multimedia data in critical infrastructure, addressing both original algorithmic development and new applications. We are soliciting original contributions, of leading researchers and practitioners from academia as well as industry, which address a wide range of theoretical and application issues in this domain.
Computer and Cyber Security - Principles, Algorithms, Applications and Perspectives
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined in widely-used systems. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies.