Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > General (C.2.0) > Security and Protection (C.2.0...)  
 
Options:
 
  1-10 of 369 Reviews about "Security and Protection (C.2.0...)": Date Reviewed
  5G wireless: a comprehensive introduction
Stallings W., Pearson, Hoboken, NJ, 2021. 672 pp.  Type: Book (978-1-367671-41-6)

The tremendous growth of mobile technology from first generation (1G) to fifth generation (5G) includes the development of mobile networks, user interfaces, and real-time implementation. The COVID-19 pandemic of the last couple years highlighted a...

Sep 20 2022
  Data-driven model-based detection of malicious insiders via physical access logs
Cheh C., Thakore U., Fawaz A., Chen B., Temple W., Sanders W. ACM Transactions on Modeling and Computer Simulation 29(4): 1-25, 2019.  Type: Article

Employees with security clearance will perhaps continue to pose the ultimate security threat to businesses, organizations, and security researchers. What kinds of data and algorithms should be effectively used to monitor and thwart ris...

Mar 8 2021
  5G enabled secure wireless networks
Jayakody D., Srinivasan K., Sharma V., Springer International Publishing, New York, NY, 2019. 200 pp.  Type: Book (978-3-030035-07-5)

Wireless 5G networks are widely deployed and, compared to previous generations, carry vastly augmented data flows with low latency. Thus, their security and privacy aspects warrant special attention [1], even if a vast number of standa...

Jan 15 2021
  Big data privacy preservation for cyber-physical systems
Pan M., Wang J., Errapotu S., Zhang X., Ding J., Han Z., Springer International Publishing, New York, NY, 2019. 84 pp.  Type: Book (978-3-030133-69-6)

This monograph gives an introduction to cyber-physical systems (CPS). These are systems that are controlled by computers and influence objects in the physical world. Areas discussed include spectrum trading (where specific radio freque...

Nov 11 2020
  Security, privacy and trust in the IoT environment
Mahmood Z., Springer International Publishing, New York, NY, 2019. 293 pp.  Type: Book (978-3-030180-74-4)

I was pleased to review this book, edited by Zaigham Mahmood. The book is divided into two parts. The first part elaborates on different technologies and frameworks for security and privacy in the Internet of Things (IoT), whereas the ...

Aug 19 2020
  Pro Azure governance and security: a comprehensive guide to Azure Policy, Blueprints, Security Center, and Sentinel
Tender P., Rendon D., Erskine S., Apress, New York, NY, 2019. 340 pp.  Type: Book (978-1-484249-09-3)

The pervasiveness of cloud technologies and the increasing popularity of Microsoft Azure make this book quite interesting for practicing software enthusiasts....

May 26 2020
  Quantifying the utility-privacy tradeoff in the Internet of Things
Dong R., Ratliff L., Cárdenas A., Ohlsson H., Sastry S. ACM Transactions on Cyber-Physical Systems 2(2): 1-28, 2018.  Type: Article

The Internet of Things (IoT), much more than other fields in computer science (CS), introduces new issues related to inferential and differential privacy. The growing use and sophistication of IoT deployment generates increasing volume...

Mar 10 2020
  Static identification of injection attacks in Java
Spoto F., Burato E., Ernst M., Ferrara P., Lovato A., Macedonio D., Spiridon C. ACM Transactions on Programming Languages and Systems 41(3): 1-58, 2019.  Type: Article

A programming language’s security principles guarantee robustness and sustainability by detecting and neutralizing any tainted object in the programming code, which can potentially be the source of any vulnerability during th...

Feb 6 2020
  Demystifying Internet of Things security: successful IoT device/edge and platform security deployment
Cheruvu S., Kumar A., Smith N., Wheeler D., Apress, New York, NY, 2020. 488 pp.  Type: Book (978-1-484228-95-1)

When a paper on Internet of Things (IoT) security is too brief, experienced users will look for other papers. This book covers many aspects of IoT security, from hardware to applications and systems....

Dec 12 2019
  A first look at Certification Authority Authorization (CAA)
Scheitle Q., Chung T., Hiller J., Gasser O., Naab J., van Rijswijk-Deij R., Hohlfeld O., Holz R., Choffnes D., Mislove A., Carle G. ACM SIGCOMM Computer Communication Review 48(2): 10-23, 2018.  Type: Article

The cornerstone of information and communications technology (ICT), security provides and maintains robustness, sustainability, and reliability. Using web services by referring to different web pages is interwoven in daily life; differ...

Nov 21 2019
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy