Take a look at our COM043040 books. Shulph carries a great selection of COM043040 books, and we are always adding more.
Cybersecurity for Beginners Key Features -In-depth coverage of cybersecurity concepts, vulnerabilities and detection mechanism. -Cutting-edge coverage on frameworks, Intrusion detection methodologies and how to design cybersecurity infrastructure. -Access to new tools, methodologies, frameworks and countermeasures developed for cybersecurity. Description Cybersecurity Fundamentals starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ‘Cybersecurity’ as an international problem. This book talks about how people started to explore the capabilities of Internet technologies to conduct crimes globally. It covers the framework for analyzing cyber costs that enables us to have an idea about the financial damages. It also covers various forms of cybercrime which people face in their day-to-day lives and feel cheated either financially or blackmailed emotionally. The book also demonstrates Intrusion Detection Systems and its various types and characteristics for the quick detection of intrusions in our digital infrastructure. This book elaborates on various traceback schemes and their classification as per the utility. Criminals use stepping stones to mislead tracebacking and to evade their detection. This book covers stepping-stones detection algorithms with active and passive monitoring. It also covers various shortfalls in the Internet structure and the possible DDoS flooding attacks that take place nowadays. What you will learn -Get to know Cybersecurity in Depth along with Information Security and Network Security. -Build Intrusion Detection Systems from scratch for your enterprise protection. -Explore Stepping Stone Detection Algorithms and put into real implementation. -Learn to identify and monitor Flooding-based DDoS Attacks. Who this book is for This book is useful for students pursuing B.Tech.(CS)/M.Tech.(CS),B.Tech.(IT)/M.Tech.(IT), B.Sc (CS)/M.Sc (CS), B.Sc (IT)/M.Sc (IT), and B.C.A/M.C.A. The content of this book is important for novices who are interested to pursue their careers in cybersecurity. Anyone who is curious about Internet security and cybercrime can read this book too to enhance their knowledge. Table of Contents 1. Introduction to Cybersecurity 2. Cybersecurity Landscape and its Challenges 3. Information Security and Intrusion Detection System 4. Cybercrime Source Identification Techniques 5. Stepping-stone Detection and Tracing System 6. Infrastructural Vulnerabilities and DDoS Flooding Attacks About the Authors Dr. Rajesh Kumar Goutam is working as an Assistant professor in the Department of Computer Science, University of Lucknow. He has over 10 years of experience in teaching and research in the field of Computer Science. He did his MCA from Uttar Pradesh Technical University, Lucknow and earned his Ph.D. in Computer Science from Babasaheb Bhimrao Ambedkar University, Lucknow. His interest lies in developing the framework to detect the true source of cybercrimes and to track the criminals across digital infrastructures. He has contributed to the cybersecurity field through his several publications in various journals of repute. He is an active member of various professional bodies too.
A Game Changer for WFH Practitioners Key Features -Get to know the challenges and benefits of VoIP. -Explore in-depth coverage on methodologies of the VoIP system. -Includes the VoIP economic model, technology model, and in-practices. Description ‘VoIP Telephony and You’ introduces you to new and advanced ways of communicating over traditional telephony realms. Telcos use public internet private IPs for this long-distance voice communication in the Covid era. This book describes how VoIP encompasses the capability to encode and deliver content in real-time across digitized networks. In this book, you will learn about VoIP regulations, VoIP hardware and software, video conferencing servers, SWOT analysis of Telcos, switching technology. You will also learn about the TCP/IP, market, Economics model, business model, and technology models. You will learn how to eliminate echo by understanding the various interfaces of VoIP and a number of digital protocols.This book will also provide you with a solution to design and maintain communication systems that can be used reliably in the Covid-19 times. This book includes several best practices and security measures to secure conversations by use of surveillance methods and VoIP security provisions. What you will learn -Learn to establish a strong and robust digital communication for WFH business operations. -Explore and evaluate buying decisions between cloud-based phones and other VoIP devices -Learn to optimize utilization of the VoIP telephony devices for audio and video conferencing. Who this book is for This book is for aspiring and current technicians, network administrators, engineers, IT managers, VoIP integrators and solution providers, mobile experts, and WFH practitioners. Table of Contents 1. Introduction to Voice over Internet Protocol (VoIP) 2. VoIP Video Conferencing and Corona Virus 3. VoIP’s Challenges and Benefits and VoIP Market’s Independent Providers 4. Overview of Systems-Level 5. Interfaces of VoIP Telephony 6. Assurance of Voice Quality for VoIP Networks 7. Implementation of VoIP Security 8. Functionality of a Data Router 9. Technical Description related to VoIP 10. VoIP Hardware and Software Components 11. Business Model and Market Model in relation with Internet Telephony 12. Technology, Economics and In-Practice to be concerned with IP telephony 13. VoIP to be Concluded About the Authors Rashmi Nanda, has done her B.Tech in Electronics and Instrumentation from Purushottam Institute of Engineering and Technology (PIET), Rourkela, Odisha. She has more than 6 years of experience in freelance content writing. LinkedIn Bio: Rashmi Nanda