Search Results
-
A Beginner’s Guide to Internet of Things Security: Attacks, Applications, Authentication, and Fundamentals
A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that ... More
Language: ENGCopyright: 2020 -
Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures (Security, Privacy, and Trust in Mobile Communications)
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CS... More
Language: ENGCopyright: 2020 -
Smart Card Security: Applications, Attacks, and Countermeasures (Security, Privacy, and Trust in Mobile Communications)
by B. B. Gupta • Megha QuamaraSmart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks as... More
Language: ENGCopyright: 2020 -
International Conference on Cyber Security, Privacy and Networking (Lecture Notes in Networks and Systems #599)
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2022), organized during September 09–11, 2022, in Thailand in online mode. The objective of ICSPN 2022 is to provide a premier international platform for... More
Language: ENGCopyright: 2023 -
Cyber Security, Privacy and Networking: Proceedings of ICSPN 2021 (Lecture Notes in Networks and Systems #370)
This book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deli... More
Language: ENGCopyright: 2022 -
Advances in Nature-Inspired Cyber Security and Resilience (EAI/Springer Innovations in Communication and Computing)
This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive ... More
Language: ENGCopyright: 2022 -
Applied Hydrogeology of Fractured Rocks: Second Edition
Hydrogeology is a topical and growing subject as the earth's water resources become scarcer and more vulnerable. More than half of the surface area of continents is covered with hard rocks of low permiability. This book deals comprehensively with the fundamental principles for understanding the hyd... More
Language: ENGCopyright: 2009 -
Viscometry for Liquids
by S. V. GuptaThis book is written for scientists involved in the calibration of viscometers. A detailed description for stepping up procedures to establish the viscosity scale and obtaining sets of master viscometers is given in the book. Uncertainty considerations for standard oils of known viscosity are pres... More
Language: ENGCopyright: 2014 -
Mass Metrology (Springer Series in Materials Science #155)
by S. V. GuptaThis second edition of Mass Metrology: The Newly Defined Kilogram has been thoroughly revised to reflect the recent redefinition of the kilogram in terms of Planck’s constant. The necessity of defining the kilogram in terms of physical constants was already underscored in the first edition. However,... More
Language: ENGCopyright: 2012 -
Units of Measurement: History, Fundamentals and Redefining the SI Base Units (Springer Series in Materials Science #122)
by S. V. GuptaThis book delivers a comprehensive overview of units of measurement. Beginning with a historical look at metrology in Ancient India, the book explains fundamental concepts in metrology such as basic, derived and dimensionless quantities, and introduces the concept of quantity calculus. It discusses ... More
Language: ENGCopyright: 2020 -
Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives
This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of comput... More
Language: ENGCopyright: 2018 -
Secure Searchable Encryption and Data Management
by Brij B. Gupta • MamtaWith the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Sto... More
Language: ENGCopyright: 2021 -
Cloud Security: Concepts, Applications and Perspectives (Cyber Ecosystem and Security)
by Brij B GuptaCloud computing is an indispensable part of the modern Information and Communication Technology (ICT) systems. Cloud computing services have proven to be of significant importance, and promote quickly deployable and scalable IT solutions with reduced infrastructure costs. However, utilization of clo... More
Language: ENGCopyright: 2021 -
Rheology Applied in Polymer Processing
by B. R. GuptaThis book covers a wide range of topics in polymer rheology. These are: • Basic Principles, parameters, systems and applied mathematical models used in the rheological studies.• Melt flow analysis of different non-Newtonian fluids in laminar flow, transition between laminar and turbulent flow and ... More
Language: ENGCopyright: 2023 -
Getting Started with Tiva ARM Cortex M4 Microcontrollers
The book presents laboratory experiments concerning ARM microcontrollers, and discusses the architecture of the Tiva Cortex-M4 ARM microcontrollers from Texas Instruments, describing various ways of programming them. Given the meager peripherals and sensors available on the kit, the authors describ... More
Language: ENGCopyright: 2018 -
Macrophage Targeted Delivery Systems: Basic Concepts and Therapeutic Applications
The proposed book is envisioned for the nascent and entry-level researchers who are interested to work in the field of drug delivery and its applications specifically for macrophage targeting. Macrophages have gained substantial attention as therapeutic targets for drug delivery considering their ma... More
Language: ENGCopyright: 2022 -
Surgery Boot Camp Manual: A Multimedia Guide for Surgical Training
This indispensable guide for medical students and surgery residents shows you exactly what to expect in the wards and the OR, how to behave, and how to perform many of the basic procedures you may be asked to do. Written by staff and residents of the Department of Surgery at Beth Israel Deaconess Me... More
Language: ENGCopyright: 2020 -
Internet of Things Security: Principles, Applications, Attacks, and Countermeasures
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, an... More
Language: ENGCopyright: 2020 -
Safety, Security, and Reliability of Robotic Systems: Algorithms, Applications, and Technologies
With the increasing demand of robots for industrial and domestic use, it becomes indispensable to ensure their safety, security, and reliability. Safety, Security and Reliability of Robotic Systems: Algorithms, Applications, and Technologies provides a broad and comprehensive coverage of the evoluti... More
Language: ENGCopyright: 2021 -
Modular Load Flow for Restructured Power Systems
Inthe subject of power systems, authors felt that a re-look is necessary at someconventional methods of analysis. In this book, the authors have subjected thetime-honoured load flow to a close scrutiny. Authors have discovered and discusseda new load flow procedure - Modular Load Flow. Modular Lo... More
Language: ENGCopyright: 2016 -
Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS)
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network. Analysis of cyber-attack vectors and the provision of app... More
Language: ENGCopyright: 2021 -
Handbook of Computer Networks and Cyber Security: Principles and Paradigms
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with exa... More
Language: ENGCopyright: 2020 -
Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012
by Millie Pant • Kusum Deep • Jagdish Chand Bansal • Atulya Nagar • B. V. Babu • Kanad Ray • Umesh GuptaThe present book is based on the research papers presented in the International Conference on Soft Computing for Problem Solving (SocProS 2012), held at JK Lakshmipat University, Jaipur, India. This book provides the latest developments in the area of soft computing and covers a variety of topics, ... More
Language: ENGCopyright: 2014 -
Active Tectonics of Kumaun and Garhwal Himalaya (Springer Natural Hazards Ser.)
<P>The book contributes to understanding the pattern of strain release and the level of seismic hazard imposed by large-great earthquakes in the frontal fold-thrust belts of Kumaun and Garhwal regions of Uttarakhand. <P>The motivation for active fault studies and their characterization have been e... More
Language: ENGCopyright: 2018 -
The Finger Millet Genome (Compendium of Plant Genomes)
This book is the first comprehensive compilation of deliberations on domestication, genetic and genomic resources, breeding, genetic diversity, molecular maps & mapping of important biotic stress as well as nutritional quality traits, genome sequencing, comparative genomics, functional genomics and ... More
Language: ENGCopyright: 2022