Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …
Table of Contents 1. What Is a Network? 2. Hubs and Switches Hubs Switches 3. Autonegotiation What Is Autonegotiation? How Autonegotiation Works When Autonegotiation Fails Autonegotiation Best Practices Configuring Autonegotiation 4. VLANs C…
Contents: Cloud computing Towards trustworthiness assurance in the cloud Security and privacy in mobile cloud under a citizen’s perspective Bringing accountability to the cloud: addressing emerging threats and legal perspectives Introducing life management platforms and collaborative service fusion to contextual environments Security and privacy management Integrating…
Contents: Chapter 1 Cyber security engineering: lifecycle assurance of systems and software 1.1 Intoduction 1.2 What do we mean by lifecycle assurance 1.3 Introducing principles for software assurance 1.4 Addressing lifecycle assurance 1.5 Case studies used in this book Chapter 2 Risk analysis-identifying and prioritizing needs 2.1 Risk management concepts 2.2 Mission risk 2.3 Mi…
Contents: 1 Cybersecurity & its origins 2 About the case studies 3 Case-study target 2013 4 The disciplines within cybersecurity 5 Case-study Edward snowden 2013 6 Basic cybersecurity concepts 7 Human factors 8 Technical cybersecurity 9 Evolting attack and defence methods 10 Case-study sony (2014) 11 The cybersecurity cold war 12 Risk-based cybersecurity & stacked risk 1…
Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures
--
Table of contents 1. A Crawler Guard for Quickly Blocking Unauthorized Web Robot 2. Privacy Preserving for Location-Based Services Using Location Transformation 3. Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux 4. Multiple-Bank E-Cash without Random Oracles 5. A Fast Chaos-Based Symmetric Image Cipher with a Novel Bit-Level Permutation Strategy 6. Preserving User Priv…
Contents Chapter 1. Virtualization Chapter 2. SDN (software-defined networking) Chapter 3. Smart edges Chapter 4. New-generation protocols Chapter 5. Mobile cloud networking and mobility control Chapter 6. Wi-fi and 5G Chapter 7. Security Chapter 8. Concrezation and morphware