Network security Books

315 products


  • Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

    Springer Verlag, Singapore Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: ​Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.Table of ContentsApplied Cryptography for Big Data.- Big Data System Security.- Forensics in Social Networks and Big Data.- Privacy Protection in Social Networks.- Security and Privacy in Big Database.- Security of AI.- Trust and Reputations in Social Networks.

    1 in stock

    £49.49

  • Recent Innovations in Computing: Proceedings of

    Springer Verlag, Singapore Recent Innovations in Computing: Proceedings of

    3 in stock

    Book SynopsisThis book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on May 8–9, 2021, at the Central University of Jammu, India, and organized by the university’s Department of Computer Science and Information Technology. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.Table of ContentsSelf-Regulation Management in Iot Infrastructure using Machine Learning.- Corpus Creation for Anaphora Resolution in Punjabi Language.- Challenges in Recognition of Kashmiri Script.- An Intensive literature Review on Machine Translation Using Neural Approach.- Notation Systems Applied on Indian Sign Language: A Review.- Anatomy of Various Biomarkers for Diagnosis of Socio Behavioral Disorders.- An Improved CSHO Technique for Mathematical and Multidisciplinary Engineering Applications.- Text Processor for IPC Prediction.- A Hybrid Approach for Sleep States Detection using Blood Pressure and EEG Signal.- Applications of Artificial Intelligence in Smart Agriculture: A Review.- Impact of Fractal Geometry on Microstrip Patch Antenna at Futuristic Frequencies.- Classification and Identification of Partial Outage in Transmission Lines using Deep Learning.- Route Tracer: A Shortest and Safest Path Calculator.- Reinforcement Learning in Medical Diagnosis: An Overview.- Importance of Pulse Examination and its Diagnostic System.- Internet of Device to Device Things: Concern, Challenges and Applications.

    3 in stock

    £179.99

  • Cyber Security, Privacy and Networking:

    Springer Verlag, Singapore Cyber Security, Privacy and Networking:

    3 in stock

    Book SynopsisThis book covers selected high-quality research papers presented in the International Conference on Cyber Security, Privacy and Networking (ICSPN 2021), organized during 17-19 September 2021 in India in Online mode. The objectives of ICSPN 2021 is to provide a premier international platform for deliberations on strategies, recent trends, innovative approaches, discussions and presentations on the most recent cyber security, privacy and networking challenges and developments from the perspective of providing security awareness and its best practices for the real world. Moreover, the motivation to organize this conference is to promote research by sharing innovative ideas among all levels of the scientific community, and to provide opportunities to develop creative solutions to various security, privacy and networking problems.Table of ContentsA New Modified MD5-224 bits Hash Function and an Efficient Message Authentication Code Based on Quasigroups.- Leveraging Transfer Learning for Effective Recognition of Emotions from Images: A Review.- An Automated System for Facial Mask Detection and Face Recognition during COVID - 19 Pandemic.- ROS Simulation Based Autonomous Navigation Systems & Object Detection.- Robotic Assistant for Medicine and Food Delivery in Healthcare.

    3 in stock

    £189.99

  • Recent Innovations in Computing: Proceedings of

    Springer Verlag, Singapore Recent Innovations in Computing: Proceedings of

    3 in stock

    Book SynopsisThis book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on June 8–9, 2021 by Eötvös Loránd University (ELTE), Budapest, Hungary in association with many Universities; WSG Poland, Knowledge University, ERBIL. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.Table of ContentsAWRPS-ROBO: Automated Weed Removal and Pesticides Spray.- Designing of Cavity Filter with Slot Coupling Mechanism for ku Band.- Use of Smart Mobile Applications with IoT in Diseases Prediction System for Apple Orchards.- Review on Miniaturized Flexible Wearable Antenna for Body Area Network.- DEERS: Design Energy Efficient Routing Scheme for Harsh Environment Monitoring in HWSNs.- Context Enriched Machine Learning based Approach for Sentiment Analysis.- Recommending Books using RNN.- A Survey on Applications of Unmanned Aerial Vehicles (UAVs).- Early Detection of Influenza using Machine Learning Techniques.- Fuzzy Time-Series Models Based on Intuitionistic Fuzzy, Rough Set Fuzzy and Differential Evolution.- Genetic Algorithm Application on 3-D Pipe Routing: A Review.- Directed Undersampling using Active Learning for Particle Identification.- Smart Agriculture using Internet of Things: An Empirical Study.- A Study on the Implementation of Secure VANETs using FPGA.- Massive MIMO System – Overview, Challenges and Course of Future Research.- Millimeter-Wave Dual-Band (32/38 GHz) Microstrip Patch Antenna for 5G Communication.- Design and Analysis of Single band and Wideband Wineglass Shaped Patch Antenna for WLAN and Satellite Applications.

    3 in stock

    £179.99

  • Security, Privacy and Data Analytics: Select

    Springer Verlag, Singapore Security, Privacy and Data Analytics: Select

    3 in stock

    Book SynopsisThis book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe.Table of ContentsChapter 1: NITG Chain: A Scalable, Private and Permissioned Blockchain with Proof of Reputation Consensus Method.- Chapter 2: Safeguarding Geo-location for Social Media with Local Differential Privacy and l-diversity.- Chapter 3: Detection of False Data Injection Cyber Attack in Smart Grid by Convolutional Neural Network based Deep Learning Technique.- Chapter 4: Democratic After-Market for Domain Names.- Chapter 5: Defect analysis of Faulty regions in Photovoltaic Panels using Deep Learning method.- Chapter 6: Leveraging a honeypot router for discovering and characterizing attacks on routers.- Chapter 7: Multimodal Biometric Authentication using Watermarking Technique.

    3 in stock

    £98.99

  • Data Ethics and Challenges

    Springer Verlag, Singapore Data Ethics and Challenges

    3 in stock

    Book SynopsisThis book gives a thorough and systematic introduction to Data, Data Sources, Dimensions of Data, Privacy, and Security Challenges associated with Data, Ethics, Laws, IPR Copyright, and Technology Law. This book will help students, scholars, and practitioners to understand the challenges while dealing with data and its ethical and legal aspects. The book focuses on emerging issues while working with the Data.Table of ContentsData and its Dimensions.- Data Privacy.- Data Security.- Data Ethics.- Intellectual Property Right – Copyright.

    3 in stock

    £42.74

  • Big Data and Security: Third International

    Springer Verlag, Singapore Big Data and Security: Third International

    3 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the Third International Conference on Big Data and Security, ICBDS 2021, held in Shenzhen, China, in November 2021The 46 revised full papers and 13 short papers were carefully reviewed and selected out of 221 submissions. The papers included in this volume are organized according to the topical sections on cybersecurity and privacy; big data; blockchain and internet of things, and artificial intelligence/ machine learning security.Table of ContentsCybersecurity and Privacy.- Big Data.- Blockchain and Internet of Things.- Artificial Intelligence/Machine Learning Security.

    3 in stock

    £98.99

  • Cybersecurity and Identity Access Management

    Springer Verlag, Singapore Cybersecurity and Identity Access Management

    1 in stock

    Book SynopsisThis textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. Table of ContentsCybersecurity for Beginners.- The Basics of Hacking and Penetration Testing.- Hacking for Dummies.- Networking All-in-One for Dummies.- Effective Cyber Security.- Malware.- Firewalls.- Cryptography.- Control physical and logical access to assets.- Manage the Identification and Authentication of People, Devices, And Services.- Integrate Identity as A Third-Party Service.- Implement and Manage Authorization Mechanisms.- Managing the Identity and Access Provisioning Life Cycle.- Conduct Security Control Testing.- Collect Security Process Data.- Recovery Strategies for Database.- Analyze Test Output and Generate A Report.- Ensure Appropriate Asset Retention.- Determine Information and Security Controls.

    1 in stock

    £80.99

  • Cybersecurity and Identity Access Management

    Springer Verlag, Singapore Cybersecurity and Identity Access Management

    1 in stock

    Book SynopsisThis textbook provides a comprehensive, thorough and up-to-date treatment of topics in cyber security, cyber-attacks, ethical hacking, and cyber crimes prevention. It discusses the different third-party attacks and hacking processes which a poses a big issue in terms of data damage or theft. The book then highlights the cyber security protection techniques and overall risk assessments to detect and resolve these issues at the beginning stage to minimize data loss or damage. This book is written in a way that it presents the topics in a simplified holistic and pedagogical manner with end-of chapter exercises and examples to cater to undergraduate students, engineers and scientists who will benefit from this approach. Table of ContentsCybersecurity for Beginners.- The Basics of Hacking and Penetration Testing.- Hacking for Dummies.- Networking All-in-One for Dummies.- Effective Cyber Security.- Malware.- Firewalls.- Cryptography.- Control physical and logical access to assets.- Manage the Identification and Authentication of People, Devices, And Services.- Integrate Identity as A Third-Party Service.- Implement and Manage Authorization Mechanisms.- Managing the Identity and Access Provisioning Life Cycle.- Conduct Security Control Testing.- Collect Security Process Data.- Recovery Strategies for Database.- Analyze Test Output and Generate A Report.- Ensure Appropriate Asset Retention.- Determine Information and Security Controls.

    1 in stock

    £56.99

  • Proceedings of International Conference on

    Springer Verlag, Singapore Proceedings of International Conference on

    3 in stock

    Book SynopsisThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.Table of ContentsCyber-Defense Mechanism Considering Incomplete Information Using POMDP.- Monitoring, Recognition and Attendance Automation in Online Class: Combination of Image Processing, Cryptography in IoT Security.- Cyber Threat Phylogeny Assessment and vulnerabilities representation at thermal power station.- A novel data encryption technique based on DNA sequence.- Continuous Behavioral Authentication System for IoT Enabled Applications.- A secure 'e-Tendering' application based on secret image sharing.- Video based Graphical password authentication system.- Designing Robust Blind Color Image Watermarking-Based Authentication Scheme for Copyright Protection.- LSB Steganography using Three level Arnold Scrambling and Pseudo-Random Generator.- Part I: Network, Network Security and their Applications.- Performance Analysis of Retrial Queueing System in Wireless Local Area Network.- IBDNA –An Improved BDNA Algorithm Incorporating Huffman Coding Technique.- Obfuscation Techniques for a Secure Endorsement System in Hyperledger Fabric.- Mobile Operating System (Android) Vulnerability Analysis using Machine Learning.- Survey of Predictive Autoscaling and Security of Cloud Resources using Artificial Neural Networks.- Systematic literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkwe.- A Survey on Interoperability Issues at the SaaS Level Influencing the Adoption of Cloud Computing Technology.- Human Recognition based Decision Virtualization for Effecting Safety-as-a-Service using IoT Enabled Automated UV-C Sanitization System.- Part II: Blockchain Technology and its Applications.- Security Optimization of Resource-Constrained Internet of Healthcare Things (IoHT) Devices Using Asymmetric Cryptography for Blockchain Network.- Preserving Privacy using Blockchain Technology in Autonomous Vehicles.- Security Protocols for Blockchain Based Access Control in VANETS.- LIVECHAIN: Lightweight Blockchain for IOT Devices and it's Security.- Secure and scalable Attribute Based Access Control scheme for healthcare data on Blockchain platform.- Adaptive Neuro Fuzzy Inference System for Monitoring Activities in Electric Vehicles through a Hybrid Approach and Blockchain Technology.- Application of BLOCKCHAIN in Agriculture: An Instance of Secure Financial Service in Farming.- Adaptive Electronic Health Records Management And Secure Distribution Using Blockchain.- Non-Content Message Masking Model for Healthcare Data in Edge-IoT Ecosystem using Blockchain.- Voting based Consensus protocol for blockchain to maintain COVID patient records in Consortium Networks.- Blockchain Adaptation in Healthcare: SWOT Analysis.- Blockchain-IoT based Blood Supply Chain Management System.- Blockchain based COVID-19 Detection Framework Using Federated Deep Learning.- Systematic Review of Attribute-Based Access Control for a Smart City using Blockchain.- A methodical study on Blockchain technology.

    3 in stock

    £179.99

  • Machine Learning Safety

    Springer Verlag, Singapore Machine Learning Safety

    Out of stock

    Book SynopsisMachine learning algorithms allow computers to learn without being explicitly programmed. Their application is now spreading to highly sophisticated tasks across multiple domains, such as medical diagnostics or fully autonomous vehicles. While this development holds great potential, it also raises new safety concerns, as machine learning has many specificities that make its behaviour prediction and assessment very different from that for explicitly programmed software systems. This book addresses the main safety concerns with regard to machine learning, including its susceptibility to environmental noise and adversarial attacks. Such vulnerabilities have become a major roadblock to the deployment of machine learning in safety-critical applications. The book presents up-to-date techniques for adversarial attacks, which are used to assess the vulnerabilities of machine learning models; formal verification, which is used to determine if a trained machine learning model is free of vulnerabilities; and adversarial training, which is used to enhance the training process and reduce vulnerabilities. The book aims to improve readers’ awareness of the potential safety issues regarding machine learning models. In addition, it includes up-to-date techniques for dealing with these issues, equipping readers with not only technical knowledge but also hands-on practical skills.Table of Contents1. Introduction.- 2. Safety of Simple Machine Learning Models.- 3. Safety of Deep Learning.- 4. Robustness Verification of Deep Learning.- 5. Enhancement to Robustness and Generalization.- 6. Probabilistic Graph Model.- A. Mathematical Foundations.- B. Competitions.-

    Out of stock

    £53.99

  • Evolution in Computational Intelligence:

    Springer Verlag, Singapore Evolution in Computational Intelligence:

    1 in stock

    Book SynopsisThe book presents the proceedings of the 10th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2022), held at NIT Mizoram, Aizawl, Mizoram, India during 18 – 19 June 2022. Researchers, scientists, engineers, and practitioners exchange new ideas and experiences in the domain of intelligent computing theories with prospective applications in various engineering disciplines in the book. These proceedings are divided into two volumes. It covers broad areas of information and decision sciences, with papers exploring both the theoretical and practical aspects of data-intensive computing, data mining, evolutionary computation, knowledge management and networks, sensor networks, signal processing, wireless networks, protocols and architectures. This volume is a valuable resource for postgraduate students in various engineering disciplines.Table of ContentsSIFT Application Separates Motion Characteristics and Identifies Symbols on Tires.- Localization and classification of thoracic abnormalities from chest radiographs using deep ensemble model.- Comparative Study on Different Approaches for Understanding the Privacy Policies.- A framework for the development of Intrusion detection system using Deep Learning.- A Self Explainable Face Anti-Spoofing Solution based on Depth-Estimation.- A Naïve Approach for Mutation Detection using Color Encodings and String Matching Techniques.- Particulate Matter Concentration Estimation from Images Based on Convolution Neural Network.- Brain Tumor Prediction from MRI Images using an ensemble model based on EfficientNet-B2, B4, and ResNet34 architectures.- Automatic Abnormality Detection in Musculoskeletal Radiographs using Ensemble of Pre-trained Networks.- Ablation study of Indian Automatic Vehicle Number Plate Recognition model trained over Synthetic dataset.- An Approach of Hate Speech Identification on Twitter Corpus.- A Fuzzy C-Means Based Clustering Protocol to Improve QoS of Multi Sink WSNs.- A Descriptive Analysis of Reddit Comments using Data Analytics Approach.- Streamflow forecasting using novel ANFIS-GWO approach.- A Novel COVID-19 Based Optimization Algorithm (C-19BOA) for Multimodal Optimization Processes.- A Survey on Medical Image Analysis Using Deep Learning.- Improving English-Assamese Neural Machine Translation using Transliteration-based Approach.- Prediction of Air Quality using Machine Learning.- Inter domain text classification: A hybrid approach.- Sentimental Analysis of Twitter Users’ Text Using Machine Learning.

    1 in stock

    £208.99

  • Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

    Springer Verlag, Singapore Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

    1 in stock

    Book SynopsisThis volume constitutes the papers of several workshops which were held in conjunction with the 4th International Conference on Science of Cyber Security Workshops, SciSec 2022, held in Matsue, Japan, in August 10–12, 2022. The 15 revised full papers and 3 posters were presented in this book were carefully reviewed and selected from 30 submissions.They were organized in topical sections as follows: AI Crypto and Security Workshop (AI-CryptoSec); Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT); and Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).Table of Contents​AI Crypto and Security Workshop (AI-CryptoSec).- Image Data Recoverability against Data Collaboration and its Countermeasure.- Image Data Recoverability against Data Collaboration and its Countermeasure.- Human Security Behavior Assistance in the Cyber-physical Space.- A Privacy-preserving Electricity Theft Detection (PETD) Scheme for Smart Grid.- Design and implementation of VCP network for Open Flow.- Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT).- Medical waste treatment process based on Blockchain technology - a case study of Covid-19 waste handling in Vietnam.- Blockchain technology-based management of blood and its products - a case study in Vietnam.- Application of the elimination competition mechanism based on blockchain multi-supervision in vehicle data sharing.- Economic Perspective of Cybersecurity: Principles and Strategies.- Towards a Dynamic Reputation Management Scheme for Cross-chain Transactions.- Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).- Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation between Source and Keys.- A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-Feature Fusion in Smart Grid.- A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem.- Multi-Client Private Decision Tree Classification using Threshold Fully Homomorphic Encryption.- Advances in adversarial attacks and defenses in Intrusion Detection System: A survey.- Zero-touch Provisioned Device Lifecycle and Its Security in IoT.- Activation Code Delivery on V2X Pseudonym Certificate Revocation.- Federated Active Learning.

    1 in stock

    £53.99

  • Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers

    Springer Verlag, Singapore Cyber Security: 19th China Annual Conference, CNCERT 2022, Beijing, China, August 16–17, 2022, Revised Selected Papers

    1 in stock

    Book SynopsisThis open access book constitutes the refereed proceedings of the 18th China Annual Conference on Cyber Security, CNCERT 2022, held in Beijing, China, in August 2022. The 17 papers presented were carefully reviewed and selected from 64 submissions. The papers are organized according to the following topical sections: ​​data security; anomaly detection; cryptocurrency; information security; vulnerabilities; mobile internet; threat intelligence; text recognition.Table of ContentsData Security.- Anomaly Detection.- Cryptocurrency.- Information Security.- Vulnerabilities.- Mobile Internet.- Threat Intelligence.- Text Recognition.

    1 in stock

    £31.49

  • Security In Distributed And Networking Systems

    World Scientific Publishing Co Pte Ltd Security In Distributed And Networking Systems

    Out of stock

    Book SynopsisSecurity issues in distributed systems and network systems are extremely important. This edited book provides a comprehensive treatment on security issues in these systems, ranging from attacks to all kinds of solutions from prevention to detection approaches. The books includes security studies in a range of systems including peer-to-peer networks, distributed systems, Internet, wireless networks, Internet service, e-commerce, mobile and pervasive computing. Security issues in these systems include attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, security architectures and protocols, security theory and tools, secrecy and integrity, and trust models. This volume provides an excellent reference for students, faculty, researchers and people in the industry related to these fields.Table of ContentsBootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes; Cover-Free Families, Key Distribution Patterns and Their Applications in Network Security; Group Rekeying in Multi-Privileged Group Communications for Distributed Networking Services; Secure Network Programming for Distributed Sensor Networks; Security Optimization in Real-Time Systems; Threshold Cryptography in Distributed Systems; Security Risks in Multi-Agent Systems; Security in Service Discovery and Provision in Ad Hoc Networks; Security in Web-Based Networking; A Taxonomy of Attacks and Defense Mechanisms in Wireless Embedded Systems; Securing Wireless Networks Using Device Type Identification; Attacks and Countermeasures in Ad Hoc Routing; Access Control Policy Negotiation for Remote Hot-deployed Grid Services; and other papers.

    Out of stock

    £144.00

  • Advances in Computing and Network Communications:

    Springer Verlag, Singapore Advances in Computing and Network Communications:

    3 in stock

    Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14–17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.Table of ContentsPart 1: Machine Learning, Visual Computing and Signal Processing.- Chapter 1. Computational Reconstructions of Extracellular Action Potentials and Local Field Potentials of a Rat Cerebellum using Point Neurons.- Chapter 2. Iris Recognition using Integer Wavelet Transform and Log Energy Entropy.- Chapter 3. Deep Learning Based Approach for Skin Burn Detection with Multi-level Classification.- Chapter 4. Semantic Retrieval of Microbiome Information Based on Deep Learning.- Chapter 5. Early Detection of Covid-19 on CT Scans Using Deep Learning Techniques.- Chapter 6. Towards Protein Tertiary Structure Prediction using LSTM/BLSTM.- Chapter 7. An Android Based Smart Home Automation System in Native Language.- Chapter 8. Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity.- Chapter 9. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing.- Chapter 10. Prediction of Energy Consumption using Statistical and Machine Learning Methods and Analysing the Significance of Climate and Holidays in the Demand Prediction.- Chapter 11. Ranking of Educational Institutions based on user priorities using AHP-PROMETHEE Approach.- Chapter 12. Using AUDIT Scores to Identify Synbiotic Supplement Effect in High Risk Alcoholics.- Chapter 13. Accurate Identification of Cardiac Arrhythmia using Machine Learning Approaches.- Chapter 14. Learning based Macro Nutrient Detection Through Plant Leaf.- Chapter 15. Characteristics of Karawitan Musicians' Brain: sLORETA Investigation.

    3 in stock

    £161.99

  • Firewall Design And Analysis

    World Scientific Publishing Co Pte Ltd Firewall Design And Analysis

    Out of stock

    Book SynopsisThis unique book represents the first rigorous and comprehensive study of firewall policy design and analysis. Firewalls are the most critical and widely deployed intrusion prevention systems. Designing new firewall policies and analyzing existing firewall policies have been difficult and error-prone. This book presents scientifically sound and practically useful methods for designing and analyzing firewall policies.This book is useful to a variety of readers. First, it can be used as a handbook for network/firewall administrators and network security professionals. Second, it can be used as an advanced textbook for graduate students and senior undergraduate students in computer science and engineering. Third, it is also suitable for non-experts in network security who wish to understand more about firewalls. The presentation of the book is detailed enough to capture the interest of curious readers, and complete enough to provide the necessary background material needed to delve further into the subject of firewalls and network security.Table of ContentsStructured Firewall Design; Diverse Firewall Design; Stateful Firewall Model; Firewall Queries; Firewall Redundancy Detection.

    Out of stock

    £67.45

  • Security In Ad-hoc And Sensor Networks

    World Scientific Publishing Co Pte Ltd Security In Ad-hoc And Sensor Networks

    Out of stock

    Book SynopsisSecurity issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.Table of ContentsAuthentication; Privacy; Routing; Reliability; Reconfigurability.

    Out of stock

    £120.60

  • Mobile Computing and Sustainable Informatics:

    Springer Verlag, Singapore Mobile Computing and Sustainable Informatics:

    1 in stock

    Book SynopsisThis book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2022) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during January 11–12, 2023. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices to personalized, embedded, and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models, and advanced informatics that support the symbiosis of mobile computing and sustainable informatics.Table of Contents​Measuring the technical efficiency of Thai rubber export using the spatial stochastic frontier model under the BCG conceptChanamart Intapan, Chukiat ChaiboonsriAnalysis of Digital data Consumption of video streaming platforms during COVID-19Lizeth Aracelly Lopez-Orosco, Valeria Alexandra Solano-Guevara, Adriana Margarita Turriate-Guzman, Luis-Rolando Alarcón-LlontopA Prototype of Wireless Power Transmission System Based on ArduinoMd. Rawshan Habib, Ahmed Yousuf Suhan, Md. Shahnewaz Tanvir, Abhishek Vadher, Md. Mossihur Rahman, Shuva Dasgupta Avi, Shabuj Dasgupta AmiShort review on blockchain technology for smart city securityAlanoud Alquwayzani, M M Hafizur RahmanEfficient Analysis of Sequences of Security Problems in Access Control SystemsAnh Tuan TruongArtificial Intelligence in Agriculture: Machine Learning based Early Detection of Insects and Diseases with Environment and Substance Monitoring us-ing IoTGnana Rajesh D, Yaqoob Yousuf Said Al Awfi, Murshid Qasim Mohammed AlmaawaliDesign Concepts for Mobile Computing Direction Finding SystemsJuliy Boiko, Oleksiy Polikarovskykh, Vitalii Tkachuk, Hanna Yehoshyna, Lesya KarpovaA Hybrid Machine Learning Model for Urban Mid- and Long-term Electricity Load ForecastingXianghua Tang, Zhihui Jiang, Lijuan Zhang, Jiayu Wang, Youran Zhang, Liping ZhangOptimizing Long Short-Term Memory by Improved Teacher Learning Based Optimization for Ethereum Price ForecastingMarija Milicevic, Luka Jovanovic, Nebojsa Bacanin, Miodrag Zivkovic, Dejan Jovanovic, Milos Antonijevic, Nikola Savanovic, Ivana StrumbergerA Sophisticated review on Open Verifiable Health Care system in CloudMandava Varshini, Kolla Akshaya, Katakam Krishna Premika, A Vijaya KumarFuzzy Metadata Augmentation for Multimodal Data ClassificationYuri Gordienko, Maksym Shulha, Yuriy Kochura, Oleksandr Rokovyi, Oleg Alienin, Sergii StirenkoDevelopment of information accuracy control systemMehdiyeva A M, Sardarova I Z, Mahmudova Z AMODELLING AN EFFICIENT APPROACH TO ANALYZE CLONE PHISHING AND PREDICT CYBER-CRIMESBondili Sri Harsha Sai Singh, Mohammed Fathima, Mohammad Sameer, Thota Teja Mahesh, Dinesh Kumar A, K PadmanabanThe Application of Mobile Phones to Enable Traffic Flow OptimisationT Shilowa, J P van Deventer, M J Hattingh

    1 in stock

    £189.99

  • Space-Air-Ground Integrated Network Security

    Springer Verlag, Singapore Space-Air-Ground Integrated Network Security

    1 in stock

    Book SynopsisThis book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.Table of ContentsChapter 1 Introduction to SAGIN Security.- Chapter 2 Theory Foundation of SAGIN Security.- Chapter 3 Ground Network Security.- Chapter 4 Airborne Network Security.- Chapter 5 Space Network Security.- Chapter 6 Future Trend of Network Security.

    1 in stock

    £143.99

  • Privacy Computing: Theory and Technology

    Springer Verlag, Singapore Privacy Computing: Theory and Technology

    1 in stock

    Book SynopsisThe continuous evolution and widespread application of communication technology, network technology and computing technology have promoted the intelligent interconnection of all things and ubiquitous sharing of information. The cross-border, cross-system, and cross-ecosystem exchange of user data has become commonplace. At the same time, difficulties in the prevention of private information abuse and lack of protection methods have become global problems. As such, there is an urgent need to intensify basic theoretical research in this field to support the protection of personal information in a ubiquitously interconnected environment. The authors of this book proposed the concept, definition and research scope of privacy computing for the first time in 2015. This book represents their original and innovative scientific research achievement dedicated to privacy computing research, and systematically explains the basic theory and technology involved. It introduces readers to the connection between personal information and privacy protection, defines privacy protection and privacy desensitization, clarifies and summarizes the limitations of existing privacy-preserving technologies in practical information system applications, analyzes the necessity of conducting privacy computing research, and proposes the concept, definition and research scope of privacy computing. It comprehensively expounds the theoretical system of privacy computing and some privacy-preserving algorithms based on the idea of privacy computing. In closing, it outlines future research directions.Table of ContentsChapter 1 Introduction.- Chapter 2 Privacy Protection Related Technologies.- Chapter 3 Privacy Computing Theory.- Chapter 4 Privacy Computing Technology.- Chapter 5 The future trend of privacy computing.

    1 in stock

    £118.99

  • Information Security Practice and Experience:

    Springer Verlag, Singapore Information Security Practice and Experience:

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.Table of ContentsSecure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition.- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations.- Mitigating Sybil Attacks in Federated Learning.- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy.- Cross-border Data Security from the Perspective of Risk Assessment.- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures.- CVAR-FL IoV Intrusion Detection Framework.- Transparent Security Method for Automating IoT Security Assessments.- DIDO: Data Provenance from Restricted TLS 1.3 Websites.- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing.- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G.- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files.- MalXCap: A Method for Malware Capability Extraction.- Multimodal Software bug Severity Prediction Based on Sentiment Probability.- Recovering Multi-Prime RSA Keys with Erasures and Errors.- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example.- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities.- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes.- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords.- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity.- BAHS: a Blockchain-Aided Hash-based Signature Scheme.- Lever: Making Intensive Validation Practical on Blockchain.- Tikuna: An Ethereum Blockchain Network Security Monitoring System.- Isogeny-based Multi-Signature Scheme.- Security Analysis of WAGE against Division Property based Cube Attack.- When MPC in the Head meets VC.- Quantum Key Distribution as a Service and Its Injection into TLS.- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.- XSS attack detection by attention mechanism based on script tags in URLs.- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.

    Out of stock

    £75.99

  • Frontiers in Cyber Security: 6th International

    Springer Verlag, Singapore Frontiers in Cyber Security: 6th International

    Out of stock

    Book SynopsisThis volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu, China, in August 2023.The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.Table of ContentsBlockchain and Distributed Systems.- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things.- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV.- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System.- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts.- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode.- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV.- Network Security and Privacy Protection.- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs.- A Secure Mutual Authentication Scheme for Wireless Communication.- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention.- Improving Accuracy of Interactive Queries in Personalized Differential Privacy.- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead.- Security-Enhanced Function Privacy Attribute-Based Encryption.- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid.- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC.- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy.- Efficient and Secure Count Queries on Encrypted Genomic Data.- Automatic construction of knowledge graph for personal sensitive data.- Cryptography and Encryption Techniques.- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles.- Secure arbitrated quantum signature scheme with Bell state.- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification.- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain.- A New Self-Dual-BKZ algorithm based on Lattice Sieving.- A Certificateless Designated Verifier Sanitizable Signature.- An Inner Product Function Encryption Scheme for Secure Distance Calculation.- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem.- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model.- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles.- An Improved Updatable Signature Scheme with Weakened Token.- A pairing-based certificateless authenticated searchable encryption with MTI guarantees.- Machine Learning and Security.- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU.- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets.- Secure Steganography Scheme based on Steganography Generative Adversarial Network.- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data.- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks.- An Intrusion Detection System Using Vision Transformer for Representation Learning.- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification.- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks.- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes.- Internet of Things and System Security.- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme.- A Regenerating Code Based Data Restoration Scheme in Active RFID System.- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare.- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning.- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-Task Meta-Learning.- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.

    Out of stock

    £85.49

  • Rethinking Cyber Security

    Kendall/Hunt Publishing Co ,U.S. Rethinking Cyber Security

    4 in stock

    Book SynopsisCybersecurity is more than a buzz word. It is a necessity for every computer system and network on the planet. Hacking is at an all-time high with digital criminals stealing data from governments to technology companies, and everyone in between. Your data may be the next treasure trove of information a hacker wants to get their hands on, and your network may be the next target beaconing vulnerabilities across the internet. History has shown the only effective method at defending a network is to implement a layered security approach with security appliances and applications strategically placed throughout a network. But even some of those methods have failed.Rethinking Cyber Security will give you the background information you need to understand how hackers operate, and the methodologies you can implement to make sure key components of your network are secure. The historic layered approach has been updated to include concepts rarely implemented with out the box solutions that will take network security to the next level. Defense of common attacks are given a new perspective with advice for more stringent controls to limit external and unauthorized access. And technical strategies are explained in simpler terms with examples anyone in the field can understand.You will learn that security does not have to be difficult, overly complicated, or extremely expensive to be effective. Simpler strategies which use already available internet technologies can heighten the security of any network and keep hackers at bay. Practical application is included for key concepts with tips on how to practice new skills in a safe environment. Common poorly figured technologies which give hackers easier access to systems and data are also discussed. Do not worry. Even the most insecure network system can be hardened against an attack when you apply this new information.Table of Contents Chapter 1: History Chapter 2: Paradigm Shift Chapter 3: Traffic Analysis Chapter 4: Vulnerability Assessment Chapter 5: Penetration Testing Chapter 6: Incident Response Evidence Collection Chapter 7: Incident Response Evidence Analysis Chapter 8: Hardening Windows Chapter 9: Hardening Linux Chapter 10: Hardening Network Chapter 11: Cloud Security Chapter 12: Cryptography Appendix 1: Linux Commands Appendix 2: Meterpreter Commands Appendix 3: Common Ports and Protocols

    4 in stock

    £58.50

  • CISSP Exam Certification Companion: 1000+ Practice Questions and Expert Strategies for Passing the CISSP Exam

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG CISSP Exam Certification Companion: 1000+ Practice Questions and Expert Strategies for Passing the CISSP Exam

    10 in stock

    Book SynopsisThis is a comprehensive guide for individuals preparing for the Certified Information Systems Security Professional (CISSP) exam. The book's main focus is to provide readers with a wealth of practice questions and expert tips to help them pass the CISSP exam.The demand for certified information security professionals continues to increase, and the CISSP exam is widely recognized as one of the most challenging and comprehensive information security certification exams. This book will provide readers with the practice and exam strategies they need to pass the CISSP exam and launch their careers in information security. It covers all of the topics tested on the exam, including security management practices, access control systems and methodology; laws, regulations, standards, and compliance; and telecommunications and network security.In addition to providing practice questions, this book also includes background information on the CISSP exam, including the exam format, content, and best ways to study for the exam. It is designed to be user friendly and easy to follow, with clear explanations and examples for all the practice questions.What You Will Learn Gain a comprehensive understanding of the CISSP Common Body of Knowledge (CBK) Gain background information on the CISSP exam, including the exam format, content, and best ways to study for the exam Develop the critical thinking skills that are essential for success on the CISSP exam Master test-taking strategies for successfully passing the CISSP exam Prepare through a realistic simulation of the actual CISSP exam Who this book is for:Individuals preparing for the Certified Information Systems Security Professional (CISSP) exam—someone who has a background in information technology or information security and is looking to pass the CISSP exam and become a CISSP-certified professional.Secondary audiences include information technology professionals looking to expand their knowledge and skills in the field of information security, individuals interested in pursuing a career in information security and considering the CISSP certification, and current or aspiring information security managers who want to advance their careers and take on more responsibilities in their organizations.Table of ContentsChapter 1: Introduction.- Chapter 2: CISSP Exam Format and Content.- Chapter 3: Security and Risk Management.- Chapter 4: Asset Security.- Chapter5: Security Architecture and Engineering.- Chapter 6: Communications and Network Security.- Chapter 7: Identity and Access Management.- Chapter 8: Security Assessment and Testing.- Chapter 9: Security Operations.- Chapter 10: Software Development Security.- Chapter 11: Test-taking Strategies and Tips.- Chapter 12: Conclusion.

    10 in stock

    £43.99

  • Enterprise Cyber Risk Management as a Value

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Enterprise Cyber Risk Management as a Value

    1 in stock

    Book SynopsisThis book will help you learn the importance of organizations treating enterprise cyber risk management (ECRM) as a value creator, a business enabler, and a mechanism to create a competitive advantage. Organizations began to see the real value of information and information technology in the mid-1980s. Forty years later, it’s time to leverage your ECRM program and cybersecurity strategy in the same way. The main topics covered include the case for action with specific coverage on the topic of cybersecurity as a value creator, including how the courts, legislators, and regulators are raising the bar for C-suite executives and board members. The book covers how the board’s three primary responsibilities (talent management, strategy, and risk management) intersect with their ECRM responsibilities.ECRM was once solely focused on managing the downside of risk by defending the organization from adversarial, accidental, structural, and environmental threat sources. Author Bob Chaput presents the view that we must focus equally on managing the upside of cyber strengths to increase customer trust and brand loyalty, improving social responsibility, driving revenue growth, lowering the cost of capital, attracting higher quality investments, creating competitive advantage, attracting and retaining talent, and facilitating M&A work. He focuses on the C-suite and board role in the first part and provides guidance on their roles and responsibilities, the most important decision about ECRM they must facilitate, and how to think differently about ECRM funding. You will learn how to the pivot from cost-center thinking to value-center thinking.Having built the case for action, in the second part, the book details the steps that organizations must take to develop and document their ECRM program and cybersecurity strategy. The book first covers how ECRM must be integrated into business strategy. The remainder of that part presents a sample table of contents for an ECRM Program and Cybersecurity Strategy document and works through each section to facilitate development of your own program and strategy. With all the content and ideas presented, you will be able to establish, implement, and mature your program and strategy.What You Will Learn Read new information and treat ECRM and cybersecurity as a value creator Receive updates on legal cases, legislative actions, and regulations that are raising the stakes for organizations, their C-suites, and boards Think differently about funding ECRM and cybersecurity initiatives Understand the most critical ECRM decision that boards must facilitate in their organizations Use practical, tangible, actionable content to develop and document your ECRM program and cybersecurity strategy “This book should be mandatory reading for C-suite executives and board members. It shows you how to move from viewing cybersecurity as a risk to avoid, and a cost center that does not add value and is overhead, to seeing cybersecurity as an enabler and part of your core strategy to transform your business and earn customer and stakeholder trust.” —Paul Connelly, First CISO at the White House and HCA Healthcare Who This Book Is ForThe primary audience includes Chief Information Security Officers, Chief Risk Officers, and Chief Compliance Officers. The secondary audience includes C-suite executives and board members. The tertiary audience includes any stakeholder responsible for privacy, security, compliance, and cyber risk management or students of these topics.Table of Contents

    1 in stock

    £29.69

  • Information Systems Security in Small and

    Nova Science Publishers Inc Information Systems Security in Small and

    1 in stock

    Book Synopsis

    1 in stock

    £58.39

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account