Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, 1st Edition

  • Junaid Ahmed Zubairi
  • Published By:
  • ISBN-10: 1609608526
  • ISBN-13: 9781609608521
  • DDC: 005.8
  • Grade Level Range: College Freshman - College Senior
  • 336 Pages | eBook
  • Original Copyright 2012 | Published/Released November 2012
  • This publication's content originally published in print form: 2012

  • Price:  Sign in for price



Cyber security, encompassing both information and network security, is of utmost importance in today’s information age. CYBER SECURITY STANDARDS, PRACTICES AND INDUSTRIAL APPLICATIONS: SYSTEMS AND METHODOLOGIES details the latest and most important advances in security standards. First, it introduces the differences between information security (covers the understanding of security requirements, classification of threats, attacks and information protection systems and methodologies) and network security (includes both security protocols as well as systems which create a security perimeter around networks for intrusion detection and avoidance). In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).

Table of Contents

Front Cover.
Title Page.
Copyright Page.
Editorial Advisory Board.
List of Reviewers.
Table of Contents.
Detailed Table of Contents.
1: Mobile and Wireless Security.
2: Securing Wireless Ad Hoc Networks: State of the Art and Challenges.
3: Smartphone Data Protection Using Mobile Usage Pattern Matching.
4: Conservation of Mobile Data and Usability Constraints.
5: Social Media, Botnets and Intrusion Detection.
6: Cyber Security and Privacy in the Age of Social Networks.
7: Botnets and Cyber Security: Battling Online Threats.
8: Evaluation of Contemporary Anomaly Detection Systems (ADSs).
9: Formal Methods and Quantum Computing.
10: Practical Quantum Key Distribution.
11: Automated Formal Methods for Security Protocol Engineering.
12: Embedded Systems and SCADA Security.
13: Fault Tolerant Remote Terminal Units (RTUs) in SCADA Systems.
14: Embedded Systems Security.
15: Industrial and Applications Security.
16: Cyber Security in Liquid Petroleum Pipelines.
17: Application of Cyber Security in Emerging C4ISR Systems.
18: Practical Web Application Security Audit Following Industry Standards and Compliance.
Compilation of References.
About the Contributors.