CyberSecurity, Network Security
[ Pobierz całość w formacie PDF ]
//-->Cyber Security Standards,Practices and IndustrialApplications:Systems and MethodologiesJunaid Ahmed ZubairiState University of New York at Fredonia, USAAthar MahboobNational University of Sciences & Technology, PakistanSenior Editorial Director:Director of Book Publications:Editorial Director:Acquisitions Editor:Development Editor:Production Editor:Typesetters:Print Coordinator:Cover Design:Kristin KlingerJulia MosemannLindsay JohnstonErika CarterMichael KillianSean WoznickiAdrienne FreelandJamie SnavelyNick NewcomerPublished in the United States of America byInformation Science Reference (an imprint of IGI Global)701 E. Chocolate AvenueHershey PA 17033Tel: 717-533-8845Fax: 717-533-8661E-mail: cust@igi-global.comWeb site: http://www.igi-global.comCopyright © 2012 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed inany form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.Product or company names used in this set are for identification purposes only. Inclusion of the names of the products orcompanies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.Library of Congress Cataloging-in-Publication DataCyber security standards, practices and industrial applications: systems and methodologies / Junaid Ahmed Zubairi andAthar Mahboob, editors.p. cm.Includes bibliographical references and index.Summary: “This book details the latest and most important advances in security standards, introducing the differencesbetween information security (covers the understanding of security requirements, classification of threats, attacks andinformation protection systems and methodologies) and network security (includes both security protocols as well assystems which create a security perimeter around networks for intrusion detection and avoidance)”--Provided by publisher.ISBN 978-1-60960-851-4 (hbk.) -- ISBN 978-1-60960-852-1 (ebook) -- ISBN 978-1-60960-853-8 (print & perpetualaccess) 1. Computer networks--Security measures. 2. Computer security. 3. Data protection. 4. Electronic data processingdepartments--Security measures. I. Zubairi, Junaid Ahmed, 1961- II. Mahboob, Athar, 1971-TK5105.59.C92 2012005.8--dc222011009262British Cataloguing in Publication DataA Cataloguing in Publication record for this book is available from the British Library.All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of theauthors, but not necessarily of the publisher.Editorial Advisory BoardKassem Saleh,Kuwait University, KuwaitSajjad Madani,COMSATS Institute of Information Technology, PakistanBadar Hussain,KCI Engineering, USAOmer Mahmoud,Int’l Islamic University, MalaysiaList of ReviewersAlfredo Pironti,Politecnico di Torino, Torino, ItalyAthar Mahboob,National University of Sciences & Technology, PakistanBadar Hussain,KCI Engineering, USADavide Pozza,Politecnico di Torino, ItalyJunaid Ahmed Zubairi,State University of New York at Fredonia, USAJunaid Hussain,National University of Sciences & Technology, PakistanKashif Latif,National University of Sciences & Technology, PakistanMorgan Henrie,Morgan Henrie Inc., USAOmer Mahmoud,Int’l Islamic University, MalaysiaRiccardo Sisto,Politecnico di Torino, ItalySajjad Ahmed Madani,COMSATS Institute of Information Technology, PakistanShakeel Ali,Cipher Storm Ltd., UKSohail Sattar,NED University of Engineering & Technology, PakistanSyed Ali Khayam,National University of Sciences & Technology, PakistanWen Chen Hu,University of North Dakota, USATable of ContentsForeword.............................................................................................................................................. xiiPreface.................................................................................................................................................xiiiAcknowledgment..............................................................................................................................xviiiSection 1Mobile and Wireless SecurityChapter 1Securing Wireless Ad Hoc Networks: State of the Art and Challenges .................................................. 1Victor Pomponiu, University of Torino, ItalyChapter 2Smartphone Data Protection Using Mobile Usage Pattern Matching .................................................. 23Wen-Chen Hu, University of North Dakota, USANaima Kaabouch, University of North Dakota, USAS. Hossein Mousavinezhad, Idaho State University, USAHung-Jen Yang, National Kaohsiung Normal University, TaiwanChapter 3Conservation of Mobile Data and Usability Constraints ...................................................................... 40Rania Mokhtar, University Putra Malaysia (UPM), MalaysiaRashid Saeed, International Islamic University Malaysia (IIUM), MalaysiaSection 2Social Media, Botnets and Intrusion DetectionChapter 4Cyber Security and Privacy in the Age of Social Networks ................................................................. 57Babar Bhatti, MutualMind, Inc., USA
[ Pobierz całość w formacie PDF ]