Computer Network and Security

Computer network security consists of the policies adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.


  In the present book, thirty literatures about computer network security published on international authoritative journals were selected to introduce the worldwide newest progress, which contains reviews or original researches on network security, cloud computing, wireless sensor network, network confidentiality and so on. We hope this book can demonstrate advances in computer network security as well as give references to the researchers, students and other related people.

Components of the Book:
  • Chapter 1
    Virtual Network Security: Threats, Countermeasures, and Challenges
  • Chapter 2
    Adoption of Security as a Service
  • Chapter 3
    A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
  • Chapter 4
    An Analysis of Security Issues for Cloud Computing
  • Chapter 5
    Estimating the Sentiment of Social Media Content for Security Informatics Applications
  • Chapter 6
    If You Want to Know about a Hunter, Study His Prey: Detection of Network Based Attacks on KVM Based Cloud Environments
  • Chapter 7
    Intelligent Feature Selection and Classification Techniques for Intrusion Detection in Networks: A Survey
  • Chapter 8
    Security in Cognitive Wireless Sensor Networks. Challenges and Open Problems
  • Chapter 9
    Anticipating Complex Network Vulnerabilities through Abstraction-Based Analysis
  • Chapter 10
    Increasing Virtual Machine Security in Cloud Environments
  • Chapter 11
    Scaling of Wireless Sensor Network Intrusion Detection Probability: 3D Sensors, 3D Intruders, and 3D Environments
  • Chapter 12
    Security Informatics Research Challenges for Mitigating Cyber Friendly Fire
  • Chapter 13
    Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace
  • Chapter 14
    Taking Back Control of Privacy: A Novel Framework for Preserving Cloud-Based Firewall Policy Confidentiality
  • Chapter 15
    Terrorist Networks and the Lethality of Attacks: An Illustrative Agent Based Model on Evolutionary Principles
  • Chapter 16
    Threat Driven Modeling Framework Using Petri Nets for E‑Learning System
  • Chapter 17
    Secure Data Networks for Electrical Distribution Applications
  • Chapter 18
    Trust Mechanisms for Cloud Computing
  • Chapter 19
    A Multi-Level Security Model for Partitioning Workflows over Federated Clouds
  • Chapter 20
    Enhancing the Security of LTE Networks against Jamming Attacks
  • Chapter 21
    Combating Online Fraud Attacks in Mobile-Based Advertising
  • Chapter 22
    Fingerprint-Based Crypto-Biometric System for Network Security
  • Chapter 23
    A Secure User Authentication Protocol for Sensor Network in Data Capturing
  • Chapter 24
    An Economic Perspective of Message-Dropping Attacks in Peer-to-Peer Overlays
  • Chapter 25
    Fluency of Visualizations: Linking Spatiotemporal Visualizations to Improve Cybersecurity Visual Analytics
  • Chapter 26
    Waterwall: A Cooperative, Distributed Firewall for Wireless Mesh Networks
  • Chapter 27
    WRSR: Wormhole-Resistant Secure Routing for Wireless Mesh Networks
  • Chapter 28
    An Effective Implementation of Security Based Algorithmic Approach in Mobile Adhoc Networks
  • Chapter 29
    How to Make a Linear Network Code (Strongly) Secure
  • Chapter 30
    Privacy and Information Security Risks in a Technology Platform for Home-Based Chronic Disease Rehabilitation and Education
Readership: Students, academics, teachers and other people attending or interested in Computer Network and Security
Christian Senk
University of Regensburg, Regensburg, Germany.

Kristin Glass
Systems Analysis, New Mexico Institute of Mining and Technology, Socorro, USA.

Alvaro Araujo
Electronic Engineering Department, Universidad Politécnica de Madrid, Avda/Complutense 30, Madrid, Spain.

Roland Schwarzkopf
Department of Mathematics and Computer Science, University of Marburg, Hans-Meerwein-Str. 3, D-35032 Marburg, Germany.

Thomas E. Carroll
Pacific Northwest National Laboratory, P.O. Box 999, Richland, Washington, USA.

Paul Ormerod
Software Development, University College London, London, UK.

David M. Laverty
School of ?Electronics, Electrical Engineering and Computer Science, Queen’s University Belfast, 125 Stransmillis Road, Belfast BT9 5AH, UK.

Jingwei Huang
Information Trust Institute, University of Illinois at Urbana-Champaign 1308 West Main Street, Urbana, Illinois 61801, USA.

Paul Watson
School of Computing Science, Newcastle University, Newcastle-upon-Tyne, UK.

Geumhwan Cho
Department of Computer Science and Engineering, Sungkyunkwan University, Seobu-ro 2066, Suwon, Republic of Korea.

and more...
This Book

320pp. Published June 2016

Scientific Research Publishing, Inc.,USA

Category:Computer Science & Communications

ISBN: 978-1-61896-361-1

(Hardcover) USD 109.00

ISBN: 978-1-61896-360-4

(Paperback) USD 89.00

Authors/Editors Price: 40% off
Buy at: bookorder@scirp.org
Follow SCIRP
Contact us
book@scirp.org
WhatsApp +86 18163351462(WhatsApp)
Click here to send a message to me 1243940697
Book Publishing WeChat
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top