
Başlık:
Creative approaches towards development of computing and multidisciplinary IT solutions for society
Yazar:
Bijalwan, Anchit, editor.
ISBN:
9781394272303
9781394272280
9781394272297
Fiziksel Tanımlama:
1 online resource
İçerik:
Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: Emerging Research in Next Generation Computing Like Cloud Computing, Cybersecurity, and Gaming -- Chapter 1 Deploying Virtual Desktop Infrastructure with Open-Source Platform for Higher Education -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Cloud Computing -- 1.2.2 Virtualization -- 1.3 VDI Deployment Using CloudStack as a Private Cloud -- 1.4 Deploy at Information Technology Laboratories -- 1.5 Conclusion -- References
Chapter 2 Enhancing Intrusion Detection Effectiveness Through an Enhanced Hierarchical Communication Architecture -- 2.1 Introduction -- 2.2 Related Works -- 2.3 Proposed Model -- 2.4 Analysis -- 2.5 Conclusion -- References -- Chapter 3 Enhanced SDN Security Using Mobile Agent -- 3.1 Introduction -- 3.1.1 Introduction to SDN -- 3.1.2 SDN Compared to Conventional Networking -- 3.2 Network Security in SDN -- 3.2.1 Vulnerabilities in SDN -- 3.2.2 Threats on SDN -- 3.3 Enhanced SDN Network Security Using Mobile Agent -- 3.3.1 Cloud Network Management Mobile Agent (CNMMA) Architecture Model
3.3.2 Mobile Agent Platform (MAP) -- 3.3.3 Network Management Mobile Agent -- 3.3.4 Mobile Agent Distributed Intrusion Detection System Framework (MA-DIDS) -- 3.3.4.1 IDS-Control Center -- 3.3.4.2 Mobile Agent SDN Control App -- 3.3.5 SDN Network Simulator -- 3.4 Conclusions -- References -- Chapter 4 Understanding the Impact and Implications of Emagnet and Pastebin in Cybersecurity -- 4.1 Introduction -- 4.1.1 Background of Emagnet and Pastebin -- 4.1.2 Importance of the Research -- 4.1.2.1 Research Questions -- 4.2 Literature Review
4.2.1 Evolution of Pastebin as a Platform for Hacker Exploits -- 4.2.1.1 Emagnet's Capabilities and Functionalities -- 4.3 Leaked Databases -- 4.4 Methodology -- 4.4.1 Emagnet -- 4.4.2 Key Features and Known Issues -- 4.4.3 How Emagnet Works -- 4.4.4 Installation and Platform Requirements -- 4.4.5 Emagnet Usage Options -- 4.4.6 Key Features and Benefits -- 4.4.7 Our Review -- 4.4.8 Pastebin -- 4.4.9 Pastebin's Dark Side -- 4.4.10 The Need for Vigilance -- 4.4.11 Leveraging Authentic8 Flash Report -- 4.4.12 The Role of Silo for Research -- 4.4.13 Our Implementation Case Study -- 4.4.14 Our Review
4.5 Countermeasures and Best Practices -- 4.5.1 Strategies for Individuals and Organizations -- 4.5.2 Strengthening Password Security and Promoting 2FA -- 4.5.3 Responsible Vulnerability Disclosure -- 4.6 Recommendations and Future Directions -- 4.6.1 Developing Effective Policies -- 4.6.2 Enhancing Collaboration Between Stakeholders -- 4.6.3 Raising Awareness Among Users -- 4.6.4 Predicting Future Trends and Challenges -- 4.7 Conclusion -- References -- Chapter 5 Mitigating the Threat of Multi-Factor Authentication (MFA) Bypass Through Man-in-the-Middle Attacks Using EvilGinx2
Özet:
This book containing 33 chapters provides an insightful look at creative approaches toward the accelerated development of computing and multidisciplinary IT solutions for society. Technology is advancing on all fronts and is opening new and innovative adaptations to our modern world every single day causing huge shifts in practices and patterns. These new technologies allow us opportunities to gain insights into the discoveries of creative and innovative approaches. The book covers emerging next-generation computing research, developments of computing, and multidisciplinary ICT solutions in seven themes: The first theme concerns the emerging research into next-generation computing like cloud computing, cyber security, and gaming; The second theme pertains to information technology in the textile industry; The third theme zeroes in on the adoption of ICT for digitalization, artificial intelligence, and machine learning; The fourth theme addresses online collaboration in the creative process; The fifth theme covers the development of computing and multidisciplinary ICT solutions for salient disciplines like education, governance, commerce, and business communication; The sixth theme provides a security assessment and defense strategies for banking and financial institutions; The seventh theme covers creative approaches towards the implementation of the 4th Industrial Revolution. Audience The book has a wide audience comprising specialists in artificial intelligence, information technology, software engineers, data and cyber security scientists, as well as those in the applied areas such as business, finance, industry and manufacturing. Policymakers and consultants will find this book useful as well.
Notlar:
John Wiley and Sons
Tür:
Yazar Ek Girişi:
Elektronik Erişim:
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394272303Kopya:
Rafta:*
Kütüphane | Materyal Türü | Demirbaş Numarası | Yer Numarası | Durumu/İade Tarihi | Materyal Ayırtma |
|---|---|---|---|---|---|
Arıyor... | E-Kitap | 599371-1001 | QA76 .C74 2024 | Arıyor... | Arıyor... |
