Reference Hub3
Indices1
Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies

Copyright: © 2012 |Pages: 336
ISBN13: 9781609608514|ISBN10: 1609608518|EISBN13: 9781609608521
DOI: 10.4018/978-1-60960-851-4
Cite Book Cite Book

MLA

Zubairi, Junaid Ahmed, and Athar Mahboob, editors. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies. IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4

APA

Zubairi, J. A. & Mahboob, A. (Eds.). (2012). Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies. IGI Global. https://doi.org/10.4018/978-1-60960-851-4

Chicago

Zubairi, Junaid Ahmed, and Athar Mahboob, eds. Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-60960-851-4

Export Reference

Mendeley
Favorite Full-Book Download

Cyber security, encompassing both information and network security, is of utmost importance in today’s information age.

Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners, and consultants in the area of social media, cyber security and information, and communication technologies (ICT).

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Mobile and Wireless Security
This content has been removed at the discretion of the publisher and the editors.
Social Media, Botnets and Intrusion Detection
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Formal Methods and Quantum Computing
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Embedded Systems and SCADA Security
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Industrial and Applications Security
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.