24,11 €
26,79 €
-10% with code: EXTRA
New Mathematical Model for Security of E commerce Network
New Mathematical Model for Security of E commerce Network
24,11
26,79 €
  • We will send in 10–14 business days.
The progress of Internet technology during the past three decades has led to a sea change in the way data has been transferred and information exchange takes place. Over the years coupled with technological development and need, Internet technology has grown, offering numerous functionalities and facilities. The growth of Internet technology has thrown severe challenges in the form of the requirement for a suitable cyber defense system to safeguard the valuable information stored on the system…
26.79
  • SAVE -10% with code: EXTRA

New Mathematical Model for Security of E commerce Network (e-book) (used book) | bookbook.eu

Reviews

Description

The progress of Internet technology during the past three decades has led to a sea change in the way data has been transferred and information exchange takes place. Over the years coupled with technological development and need, Internet technology has grown, offering numerous functionalities and facilities. The growth of Internet technology has thrown severe challenges in the form of the requirement for a suitable cyber defense system to safeguard the valuable information stored on the system and for information in transit. Towards this goal, it makes us necessary to study and understand the different types of worms and develop mathematical models to represent their behavior. Worms behave like infectious diseases and are epidemic in nature. A computer worm is a self-contained program that is able to spread functional copies of itself or its segment to other computer systems without depending on another program to host its code. The model's ability to predict the worm's behavior depends greatly on the assumptions made in the modeling process. The mathematical models will be generalized to represent the behavior of numerous other worms. The generalized model will be incorporated into a cyber defense system to proactively safeguard the information and information interchange. E-Mail is one of the core media to exchange e-messages for better communication and connectivity but it is also a good medium to send worms to interconnected networks. By clicking incidentally or wrongly an attachment of a malicious executable file, the system may be infected. Here the user's awareness is necessary to avoid such types of attacks.

EXTRA 10 % discount with code: EXTRA

24,11
26,79 €
We will send in 10–14 business days.

The promotion ends in 21d.20:05:44

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,27 Book Euros!?
  • Author: Samanta Biswarup
  • Publisher:
  • ISBN-10: 4714925644
  • ISBN-13: 9784714925644
  • Format: Minkšti viršeliai, minkšti viršeliai
  • Language: English English

The progress of Internet technology during the past three decades has led to a sea change in the way data has been transferred and information exchange takes place. Over the years coupled with technological development and need, Internet technology has grown, offering numerous functionalities and facilities. The growth of Internet technology has thrown severe challenges in the form of the requirement for a suitable cyber defense system to safeguard the valuable information stored on the system and for information in transit. Towards this goal, it makes us necessary to study and understand the different types of worms and develop mathematical models to represent their behavior. Worms behave like infectious diseases and are epidemic in nature. A computer worm is a self-contained program that is able to spread functional copies of itself or its segment to other computer systems without depending on another program to host its code. The model's ability to predict the worm's behavior depends greatly on the assumptions made in the modeling process. The mathematical models will be generalized to represent the behavior of numerous other worms. The generalized model will be incorporated into a cyber defense system to proactively safeguard the information and information interchange. E-Mail is one of the core media to exchange e-messages for better communication and connectivity but it is also a good medium to send worms to interconnected networks. By clicking incidentally or wrongly an attachment of a malicious executable file, the system may be infected. Here the user's awareness is necessary to avoid such types of attacks.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)