Kirjojen hintavertailu. Mukana 11 699 587 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

129 tulosta hakusanalla Brij Mohan

Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Brij B. Gupta; Amrita Dahiya

CRC Press
2021
sidottu
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms.DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Online Social Networks Security

Online Social Networks Security

Brij B. Gupta; Somya Ranjan Sahoo

CRC Press
2021
sidottu
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc.OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.
Secure Searchable Encryption and Data Management

Secure Searchable Encryption and Data Management

Brij B. Gupta; Mamta

TAYLOR FRANCIS LTD
2023
nidottu
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management.Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
Online Social Networks Security

Online Social Networks Security

Brij B. Gupta; Somya Ranjan Sahoo

TAYLOR FRANCIS LTD
2023
nidottu
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc.OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.
Historical Dictionary of Fiji

Historical Dictionary of Fiji

Brij V. Lal

Rowman Littlefield Publishers
2015
sidottu
This book is the first concise account of the history of the Fiji islands from the beginning of human settlement to the early years of the 21st century. Its primary focus is on the period since the advent of colonial rule in the late 19th century to the present, benefiting from the author’s internationally acknowledged expertise as a scholar and writer on the Fijian past. Besides factual information, the book also offers a scholarly assessment of the people and events which have shaped Fiji’s history. The Historical Dictionary of Fiji contains a chronology, an introduction, appendixes, and an extensive bibliography. The dictionary section has over 300 cross-referenced entries on important personalities, politics, economy, foreign relations, religion, and culture. This book is an excellent resource for students, researchers, and anyone wanting to know more about Fiji.
Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Brij B. Gupta; Amrita Dahiya

TAYLOR FRANCIS LTD
2023
nidottu
The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them.Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms.DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.
Cross-Site Scripting Attacks

Cross-Site Scripting Attacks

Brij B. Gupta; Pooja Chaudhary

TAYLOR FRANCIS LTD
2022
nidottu
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.
A Beginner’s Guide to Internet of Things Security

A Beginner’s Guide to Internet of Things Security

Brij B. Gupta; Aakanksha Tewari

TAYLOR FRANCIS LTD
2022
nidottu
A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems.The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security.Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Smart Card Security

Smart Card Security

Brij B. Gupta; Megha Quamara

TAYLOR FRANCIS LTD
2022
nidottu
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card–based systems.The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card–based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card–based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks.The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card–based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card–based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card–based systems and applications. The final chapter explains the role of blockchain technology for securing smart card–based transactions and quantum cryptography for designing secure smart card–based algorithms.Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
Optical Beam Control: Imaging Satellites and Laser Systems

Optical Beam Control: Imaging Satellites and Laser Systems

Brij N. Agrawal; Jae Jun Kim; Sachin Agrawal

WILEY
2025
sidottu
The authors have designed this timely new book in response to the need for up-to-date and complete coverage of multi-disciplinary basic principles of optical beam control for imaging satellites and laser systems. As the uses of imaging satellites and laser systems increase, optical beam control for these systems will occupy engineers and scientists for years to come. The book introduces space telescopes, ground telescopes, laser communications, and high energy laser systems, covering light sources, lenses, wave optics, diffraction, and polarization, as well as fine pointing control, classical control, modern control, Kalman filters, sensors, actuators, flexible control, slew maneuvers, and acquisition, tracking, and pointing. The authors have over 30 years' experience in research, development, and testing of complex state-of-art systems, such as 3-meter diameter segmented mirror space telescopes and high energy laser beam control systems. As a text and reference dealing with basics of optical beam control, this book includes information on: Sources of aberrations, vibration and jitter, optical aberrations, air turbulence, and measure of optical aberrations Vibration isolation and jitter control, active jitter control, strap down, and inertial stable platform Adaptive optics, wavefront sensors, wavefront reconstruction, adaptive optics configurations, and control systems Imaging satellites, telescope design, optical train components, image aberration, and performance analysis Laser beam control hardware, laser aberration, and laser performance analysis Optical Beam Control is an essential reference for engineers working in imaging satellites and laser systems along with electrical engineers focused on optics, satellites, lasers, and control systems. The text is also valuable for students taking courses on laser technology, satellite control, spacecraft design, and optics and photonics.
Standard Handbook for Aerospace Engineers, Second Edition

Standard Handbook for Aerospace Engineers, Second Edition

Brij N. Agrawal; Max F. Platzer

McGraw-Hill Education
2018
sidottu
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.A single source of essential information for aerospace engineersThis fully revised resource presents theories and practices from more than 50 specialists in the many sub-disciplines of aeronautical and astronautical engineering—all under one cover. The Standard Handbook for Aerospace Engineers, Second Edition, contains complete details on classic designs as well as the latest techniques, materials, and processes used in aviation, defense, and space systems. You will get insightful, practical coverage of the gamut of aerospace engineering technologies along with hundreds of informative diagrams, charts, and graphs.Standard Handbook for Aerospace Engineers, Second Edition covers:•Futures of aerospace•Aircraft systems•Aerodynamics, aeroelasticity, and acoustics•Aircraft performance•Aircraft flight mechanics, stability, and control •Avionics and air traffic management systems•Aeronautical design•Spacecraft design•Astrodynamics•Rockets and launch vehicles•Earth’s environment and space•Attitude dynamics and control
Jewels For Children: A childrens book filled with stories of character education and some of life's most valuable lessons
A Childrens Book Filled With Stories Of Character Education And Some Of Life's Most Valuable Lessons. This enjoyable collection of short stories follows the adventures and experiences of three siblings: Lilly, Mike and Angel, growing up as loving, honest, happy and caring children. Have fun as you read along and at the same time you will learn about the human values and morals which play an important part in their lives.FOR PARENTS AND TEACHERS, this is a great book to read with your kids. It teaches them at a young age lessons in Character Education through stories and characters which will inspire and excite them. This book is a must have for reintroducing young children to values which will strengthen their self-esteem and grow their confidence. "Jewels For Children" has been recognized by the National Library and Information System Authority of Trinidad & Tobago with a "First Time Author" award and by the City of Brampton, Ontario, Canada with a Citizen's Arts and Culture Award.
Shrimad Bhagvadgita Gyan

Shrimad Bhagvadgita Gyan

Brij Gupta

White Falcon Publishing
2021
pokkari
Bhagvadgita teachings explained in a very simple language, easy to understand so that one can follow the teachings given by Lord Krishna to Arjuna in the middle of the battle field and live a peaceful and happy life.The author will contribute Rs. 200 to the PM Care Fund for every copy sold, till June 2021.
Forest Rights Act - Accelerated Deforestation

Forest Rights Act - Accelerated Deforestation

Brij Kishore Singh

Notion Press
2021
nidottu
The book 'Forest Rights Act - Accelerated Deforestation' has highlighted the disastrous consequences of enactment and implementation of "The Scheduled Tribes and Other Traditional Forest Dwellers (Recognition of Forest Rights) Act, 2006 and Rules, 2008" on the forests of the country. With graphic details taken from the states of Maharashtra, Madhya Pradesh, Chhattisgarh, Andhra Pradesh, Telangana, Odisha and Karnataka, the book has recounted how this Act and the Rules, introduced during the UPA regime ostensibly for setting right historical injustice, have triggered decimation, fragmentation and degradation of millions of hectares of forest in a span of just a decade and a half. The book has also underscored the role of aggressive politicians, scheming activists and pliant bureaucrats in the implementation of the FRA which in a roundabout manner has facilitated regularization of unauthorized forest encroachments, virtually negating the benefits accrued from the historic Forest (Conservation) Act of 1980. It has also questioned the open-ended nature of the Act with no last date for claiming rights under it, which has resulted in opening floodgates for fresh encroachment of forest land throughout the length and breadth of the country. Given the far-reaching and beneficial influence of the forest ecosystems on the life and future of humankind, and also considering the ominous implications of the FRA on the country's shrinking forests, already on the brink of an ecological disaster, the book has recommended repeal of the Act.
Physics World

Physics World

Brij Bhushan

Notion Press
2021
pokkari
This book contain all important topic and the best physics notes for the students. In this book the concept in is very easy manner any kind of student understand it. Uses of picture to understand deeply about any topic. This book is also important not for gaining sood marks but it is also good for gaining knowledge. So i hope you all understand the concept of this book. This book help you to score good marks in physics . This book especially for physics lover. Thankyou.
Chemistry World

Chemistry World

Brij Bhushan

Notion Press
2021
pokkari
This book is very useful for all the student who wants to know more about chemistry. In this book the concept is in very easy way any kind of student can understand it . This book can be used to score good marks in the examination.