Proceedings of International Ethical Hacking Conference 2018

eHaCON 2018, Kolkata, India

Nonfiction, Science & Nature, Technology, Telecommunications, Computers, Networking & Communications, Computer Security
Cover of the book Proceedings of International Ethical Hacking Conference 2018 by , Springer Singapore
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9789811315442
Publisher: Springer Singapore Publication: October 4, 2018
Imprint: Springer Language: English
Author:
ISBN: 9789811315442
Publisher: Springer Singapore
Publication: October 4, 2018
Imprint: Springer
Language: English

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.

More books from Springer Singapore

Cover of the book Methods For Monitoring Tiger And Prey Populations by
Cover of the book The Southeast Asian Woman Writes Back by
Cover of the book China's Technology Innovators by
Cover of the book Virus Protein and Nucleoprotein Complexes by
Cover of the book Regulations and Applications of Ethics in Business Practice by
Cover of the book Biohydrogen Production from Organic Wastes by
Cover of the book Earthquake Disaster Simulation of Civil Infrastructures by
Cover of the book Approaches to Heavy Metal Tolerance in Plants by
Cover of the book Evidence-based Research Methods for Chinese Medicine by
Cover of the book Cyber Security by
Cover of the book Balancing Control and Flexibility in Public Budgeting by
Cover of the book Intelligent Communication, Control and Devices by
Cover of the book Formal Methods for Safety and Security by
Cover of the book Feminism(s) in Early Childhood by
Cover of the book The Role of SDN in Broadband Networks by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy