000 04020nam a22005775i 4500
001 978-981-13-1544-2
003 DE-He213
005 20220801220016.0
007 cr nn 008mamaa
008 181004s2019 si | s |||| 0|eng d
020 _a9789811315442
_9978-981-13-1544-2
024 7 _a10.1007/978-981-13-1544-2
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aProceedings of International Ethical Hacking Conference 2018
_h[electronic resource] :
_beHaCON 2018, Kolkata, India /
_cedited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J. K. Mandal.
250 _a1st ed. 2019.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2019.
300 _aXXVI, 506 p. 206 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v811
505 0 _aChapter 1.Social Engineering Attack Detection and Data Protection Model (SEADDPM) -- Chapter 2.OnlineKALI: Online Vulnerability Scanner -- Chapter 3.Towards an AI-Chatbot driven Advanced Digital Locker -- Chapter 4.A hybrid task scheduling algorithm for efficient task management in multi cloud environment -- Chapter 5.An Enhanced Post Migration Algorithm for Dynamic Load Balancing in Cloud Computing Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment -- Chapter 7.Bi-Symmetric Key Exchange: A Novel Cryptographic Key Exchanging Algorithm -- Chapter 8.DNA Cryptography Based Secured Weather Prediction Model in High Performance Computing -- Chapter 9.A Novel Approach of Image Steganography with Encoding and Location Selection -- Chapter 10.Image Encryption using Pseudorandom Permutation.-..etc.
520 _aThis book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aData Structures and Information Theory.
_931923
700 1 _aChakraborty, Mohuya.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947799
700 1 _aChakrabarti, Satyajit.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947800
700 1 _aBalas, Valentina Emilia.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947801
700 1 _aMandal, J. K.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_947802
710 2 _aSpringerLink (Online service)
_947803
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811315435
776 0 8 _iPrinted edition:
_z9789811315459
830 0 _aAdvances in Intelligent Systems and Computing,
_x2194-5365 ;
_v811
_947804
856 4 0 _uhttps://doi.org/10.1007/978-981-13-1544-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c78103
_d78103