Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
378,618
result(s) for
"Security Measures"
Sort by:
Security management in mobile cloud computing
\"This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms\"-- Provided by publisher.
Cyber security in parallel and distributed computing : concepts, techniques, applications and case studies
by
Mishra, Brojo Kishore
,
Khari, Manju
,
Kumar, Raghvendra
in
Computer networks
,
Computer networks -- Security measures
,
Computer security
2019
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field.
A Comprehensive Guide to 5G Security
by
Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila, Madhusanka Liyanage, Ijaz Ahmad, Ahmed Bux Abro, Andrei Gurtov, Mika Ylianttila
in
Communication, Networking and Broadcast Technologies
,
Components, Circuits, Devices and Systems
,
Computing and Processing
2018
<p> <strong>The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices </strong> <p> Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy concerns, new trust and service models and requirements to support IoT and mission-critical applications. While multiple books already exist on 5G, this is the first to focus exclusively on security for the emerging 5G ecosystem. <p> 5G networks are not only expected to be faster, but provide a backbone for many new services, such as IoT and the Industrial Internet. Those services will provide connectivity for everything from autonomous cars and UAVs to remote health monitoring through body-attached sensors, smart logistics through item tracking to remote diagnostics and preventive maintenance of equipment. Most services will be integrated with Cloud computing and novel concepts, such as mobile edge computing, which will require smooth and transparent communications between user devices, data centers and operator networks. <p>Featuring contributions from an international team of experts at the forefront of 5G system design and security, this book: <ul> <li>Provides priceless insights into the current and future threats to mobile networks and mechanisms to protect it</li> <li>Covers critical lifecycle functions and stages of 5G security and how to build an effective security architecture for 5G based mobile networks</li> <li>Addresses mobile network security based on network-centricity, device-centricity, information-centricity and people-centricity views</li> <li>Explores security considerations for all relative stakeholders of mobile networks, including mobile network operators, mobile network virtual operators, mobile users, wireless users, Internet-of things, and cybersecurity experts</li> </ul> <br> <p> Providing a comprehensive guide to state-of-the-art in 5G security theory and practice, <em>A Comprehensive Guide to 5G Security</em> is an important working resource for researchers, engineers and business professionals working on 5G development and deployment.
Plugged in : cybersecurity in the modern age
\"In Plugged In, we meet the men and women at the Florida Institute for Cybersecurity Research who have devoted their careers to studying and staying one step ahead of the bad guys. The stories chronicled in Gatorbytes span all colleges and units across the UF campus. They detail the far-reaching impact of UF's research, technologies, and innovations--and the UF faculty members dedicated to them. Gatorbytes describe how UF is continuing to build on its strengths and extend the reach of its efforts so that it can help even more people in even more places.\"--Publisher description.
Business Continuity and Disaster Recovery Planning for IT Professionals
by
Snedaker, Susan
in
Business
,
Business -- Data processing -- Security measures
,
Computer networks
2013,2014
Powerful Earthquake Triggers Tsunami in Pacific.Hurricane Isaac Makes Landfall in the Gulf Coast.Wildfires Burn Hundreds of Houses and Businesses in Colorado.Tornado Touches Down in Missouri.These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well.
Cloud security automation
by
Priyam, Prashant
in
Cloud computing-Security measures
,
Computer networks-Security measures
,
Networking and Servers
2018
Security issues are still a major concern for all IT organizations. For many enterprises, the move to cloud computing has raised concerns for security, but when applications are architected with focus on security, cloud platforms can be made just as secure as on-premises platforms. Cloud instances can be kept secure by employing security automation that helps make your data meet your organization's security policy. This book starts with the basics of why cloud security is important and how automation can be the most effective way of controlling cloud security. You will then delve deeper into the AWS cloud environment and its security services by dealing with security functions such as Identity and Access Management and will also learn how these services can be automated. Moving forward, you will come across aspects such as cloud storage and data security, automating cloud deployments, and so on. Then, you'll work with OpenStack security modules and learn how private cloud security functions can be automated for better time- and cost-effectiveness. Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance.
Applied Cyber Security and the Smart Grid
2013
Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system.The \"Smart Grid\" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid.