Wellcome

Handbook of e-business security / edited by João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman and Manju Khari.

Contributor(s): Tavares, João Manuel R.S [editor.] | Mishra, Brojo Kishore, 1979- [editor.] | Kumar, Raghvendra, 1987- [editor.] | Zaman, Noor, 1972- [editor.] | Khari, Manju [editor.] | Taylor and FrancisMaterial type: TextTextPublisher: Boca Raton, FL : Auerbach Publications, an imprint of Taylor and Francis, [2018]Copyright date: ©2019Edition: First editionDescription: 1 online resource (422 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780429887086 (e-book: PDF)Subject(s): COMPUTERS / Information Technology | COMPUTERS / Security / General | Business enterprises -- Computer networks -- Security measures | Computer securityAdditional physical formats: Print version: : No titleDDC classification: 658.4/78 LOC classification: HD30.38 | .H36 2018Online resources: Click here to view.
Contents:
chapter 1 Security Threats in e-Commerce / Rohit Sharma Pankaj Singh -- chapter 2 Understanding the Aspect of Cryptography and Internet Security: A Practical Approach / Anjana Mishra Sukant Kishoro Bisoy -- chapter 3 Attainment of Cybersecurity Using Support Vector Machine Involving Data Mining Techniques / Soobia Saeed M. Alam -- chapter 4 Vision of Internet of Things Framework for Smart Building / Soobia Saeed M. Alam -- chapter 5 Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review / Kshira Sagar Sahoo Ranjan Kumar Behera Bibhudatta Sahoo Mayank Tiwary -- chapter 6 Fog Computing in Internet of Things-Based E-Health System-Challenges and Opportunities for Managing Health-Associated Data / Mirjana Maksimovic -- chapter 7 Security Issues in Distributed Computation for Big Data Analytics / Ranjan Kumar Behera Kshira Sagar Sahoo Sambit Mahapatra Santanu Kumar Rath Bibudatta Sahoo -- chapter 8 Internet of Things (IoT) Security Challenges / Ramesh C. Poonia -- chapter 9 Big Data and Behavior Analytics in Marketing / Archana Singh Jayanthi Ranjan Mamta Mittal -- chapter 10 Recent Trends in the Era of Cybercrime and the Measures to Control Them / Pooja Kamat Apurv Singh Gautam -- chapter 11 Electronic Wastage: Prospects and Challenges for the Next Generation / Sudan Jha Le Hoang Son Raghvendra Kumar Manju Khari Jyotirmoy Chatterjee -- chapter 12 Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems / Unny R Balakrishnan Gaurav Mishra Nityesh Bhatt -- chapter 13 Internet of Things (IoT) Deployment in Wearable Healthcare: A Sociotechno Evaluation / Gaurav Mishra Balakrishnan Unny Nityesh Bhatt -- chapter 14 IoT-Based Privacy Control System through Android / Ravika Gupta Gulshan Shrivastava Rohit Anand Tina Tomažič -- chapter 15 Digital Signature and Its Pivotal Role in Affording Security Services / Sushree Bibhuprada B. Priyadarshini Amiya Bhusan Bagjadab Brojo Kishore Mishra.
Abstract: There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode
Ebooks Ebooks Mysore University Main Library
Not for loan

chapter 1 Security Threats in e-Commerce / Rohit Sharma Pankaj Singh -- chapter 2 Understanding the Aspect of Cryptography and Internet Security: A Practical Approach / Anjana Mishra Sukant Kishoro Bisoy -- chapter 3 Attainment of Cybersecurity Using Support Vector Machine Involving Data Mining Techniques / Soobia Saeed M. Alam -- chapter 4 Vision of Internet of Things Framework for Smart Building / Soobia Saeed M. Alam -- chapter 5 Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review / Kshira Sagar Sahoo Ranjan Kumar Behera Bibhudatta Sahoo Mayank Tiwary -- chapter 6 Fog Computing in Internet of Things-Based E-Health System-Challenges and Opportunities for Managing Health-Associated Data / Mirjana Maksimovic -- chapter 7 Security Issues in Distributed Computation for Big Data Analytics / Ranjan Kumar Behera Kshira Sagar Sahoo Sambit Mahapatra Santanu Kumar Rath Bibudatta Sahoo -- chapter 8 Internet of Things (IoT) Security Challenges / Ramesh C. Poonia -- chapter 9 Big Data and Behavior Analytics in Marketing / Archana Singh Jayanthi Ranjan Mamta Mittal -- chapter 10 Recent Trends in the Era of Cybercrime and the Measures to Control Them / Pooja Kamat Apurv Singh Gautam -- chapter 11 Electronic Wastage: Prospects and Challenges for the Next Generation / Sudan Jha Le Hoang Son Raghvendra Kumar Manju Khari Jyotirmoy Chatterjee -- chapter 12 Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems / Unny R Balakrishnan Gaurav Mishra Nityesh Bhatt -- chapter 13 Internet of Things (IoT) Deployment in Wearable Healthcare: A Sociotechno Evaluation / Gaurav Mishra Balakrishnan Unny Nityesh Bhatt -- chapter 14 IoT-Based Privacy Control System through Android / Ravika Gupta Gulshan Shrivastava Rohit Anand Tina Tomažič -- chapter 15 Digital Signature and Its Pivotal Role in Affording Security Services / Sushree Bibhuprada B. Priyadarshini Amiya Bhusan Bagjadab Brojo Kishore Mishra.

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

There are no comments on this title.

to post a comment.

No. of hits (from 9th Mar 12) :

Powered by Koha