Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
  Browse All Reviews > Computer Systems Organization (C) > Computer-Communication Networks (C.2) > General (C.2.0) > Security and Protection (C.2.0...)  
  1-10 of 724 Reviews about "Security and Protection (C.2.0...)": Date Reviewed
  Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N.  Mobile Networks and Applications 22(5): 848-858, 2017. Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest to readers who are fa...

Nov 29 2017
  Cyber security. Simply. Make it happen.: leveraging digitization through IT security
Abolhassan F.,  Springer International Publishing, New York, NY, 2017. 127 pp. Type: Book (978-3-319465-28-9)

The book is edited by Ferri Abolhassan, from Telekom Deutschland, who collected 11 chapters, each one from a different author. All chapters serve as the basis for a discussion on digitization and its impact on the future development of our society...

Nov 28 2017
  Security in high-performance computing environments
Peisert S.  Communications of the ACM 60(9): 72-80, 2017. Type: Article

Peisert starts with the question of whether there is any difference between high-performance computing and the traditional computational environment in terms of security. Apparently, there are no profound differences, aside from speed and volume, ...

Nov 28 2017
  Security-aware design for cyber-physical systems: a platform-based approach
Lin C., Sangiovanni-Vincentelli A.,  Springer International Publishing, New York, NY, 2017. 102 pp. Type: Book (978-3-319513-27-0)

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we depend on them and to what extent we end up becom...

Oct 13 2017
  Fog computing for the Internet of Things: security and privacy issues
Alrawais A., Alhothaily A., Hu C., Cheng X.  IEEE Internet Computing 21(2): 34-42, 2017. Type: Article

Connecting everything to the Internet is attractive because it can bring efficiency and convenience in many areas. However, security and privacy issues can also occur. The problem is that it is difficult to apply existing security and privacy solu...

Sep 7 2017
  Wireless sensor networks: security, coverage, and localization
Selmic R., Phoha V., Serwadda A.,  Springer International Publishing, New York, NY, 2016. 215 pp. Type: Book (978-3-319467-67-2)

With the emerging fields of Internet of Things (IoT) and wearable technologies, sensor networks have become an important concept. They have applications in many different domains, including healthcare, military, and home automation. The book is a ...

Aug 2 2017
  Ten laws for security
Diehl E.,  Springer International Publishing, New York, NY, 2016. 281 pp. Type: Book (978-3-319426-39-6)

In contrast to many security texts that are focused on interpreting the checklists included in one of the many published security standards (for example, ISO 27002:2005) to assess and improve an organization’s information security program, <...

Jun 19 2017
  Software-defined mobile networks security
Chen M., Qian Y., Mao S., Tang W., Yang X.  Mobile Networks and Applications 21(5): 729-743, 2016. Type: Article

The tremendous success of mobile devices and their applications raises a lot of questions regarding security, quality of service (QoS), and user satisfaction. It is therefore very important to address these challenges and provide cost-effective ar...

May 12 2017
  Penetration testing basics: a quick-start guide to breaking into systems
Messier R.,  Apress, New York, NY, 2016. 114 pp. Type: Book (978-1-484218-56-3), Reviews: (2 of 2)

Citing the first sentences of this volume’s chapter 1:
Penetration testing is an art. You can learn a lot of techniques and understand all of the tools, but the reality is that software is complex, especially when you start putti...
Apr 28 2017
  Quantum computational number theory
Yan S.,  Springer International Publishing, New York, NY, 2015. 252 pp. Type: Book (978-3-319258-21-8)

The idea of quantum computing including the quantum Turing machine originated in the last century. However, real interest in quantum computing developed after the seminal paper by Peter Shor [1], where he gave polynomial-time algorithms for the in...

Apr 26 2017
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy