menu
{ "item_title" : "Developments and Advances in Defense and Security", "item_author" : [" Álvaro Rocha", "Robson Pacheco Pereira "], "item_description" : "Part 1: Cybersecurity and Cyberdefense.- Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks.- Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs.- Chapter 3. Cybernetic Dependency Capacity.- Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens.- Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.- Chapter 6. Is Cyber Warfare an Alternative?.- Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment.- Chapter 8. Mobile Communication Systems Evolution and Security.- Part 2: Computer Networks, Mobility and Pervasive Systems.- Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats.- Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/9/81/139/154/9811391548_b.jpg", "price_data" : { "retail_price" : "219.99", "online_price" : "219.99", "our_price" : "219.99", "club_price" : "219.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Developments and Advances in Defense and Security|Álvaro Rocha

Developments and Advances in Defense and Security : Proceedings of Micrads 2019

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Part 1: Cybersecurity and Cyberdefense.- Chapter 1. Reducing the Attack Surface of Dynamic Binary Instrumentation Frameworks.- Chapter 2. Single Sign-On Implementation: Leveraging Browser Storage for Handling Tabbed Browsing Sign-outs.- Chapter 3. Cybernetic Dependency Capacity.- Chapter 4. Portuguese Concerns and Experience of Specific Cybercrimes: A Benchmarking with European Citizens.- Chapter 5. Classification of Phishing Attack Solutions by Employing Deep Learning Techniques: A Systematic Literature Review.- Chapter 6. Is Cyber Warfare an Alternative?.- Chapter 7. Memory Auditing for Detection of Compromised Switches in Software Defined Networks Using Trusted Execution Environment.- Chapter 8. Mobile Communication Systems Evolution and Security.- Part 2: Computer Networks, Mobility and Pervasive Systems.- Chapter 9. Evaluating Trail Formation in Collaborative UAV Networks with Lethal Threats.- Chapter 10. Visual Analytics applied in the Reduction of Air Pollution on Real Time, Derived from WSN.

This item is Non-Returnable

Details

  • ISBN-13: 9789811391545
  • ISBN-10: 9811391548
  • Publisher: Springer
  • Publish Date: June 2019
  • Dimensions: 9.21 x 6.14 x 1.19 inches
  • Shipping Weight: 2.09 pounds
  • Page Count: 534

Related Categories

You May Also Like...

    1

BAM Customer Reviews