TY - BOOK ID - 37334348 TI - Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India AU - Chakraborty, Mohuya. AU - Chakrabarti, Satyajit. AU - Balas, Valentina Emilia. AU - Mandal, J. K. PY - 2019 SN - 9811315442 9811315434 PB - Singapore : Springer Singapore : Imprint: Springer, DB - UniCat KW - Penetration testing (Computer security) KW - Telecommunication. KW - Computer security. KW - Data structures (Computer scienc. KW - Communications Engineering, Networks. KW - Systems and Data Security. KW - Data Structures and Information Theory. KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Electric communication KW - Mass communication KW - Telecom KW - Telecommunication industry KW - Telecommunications KW - Communication KW - Information theory KW - Telecommuting KW - Protection KW - Security measures KW - Electrical engineering. KW - Data structures (Computer science). KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - Electronic data processing KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Electric engineering KW - Engineering UR - https://www.unicat.be/uniCat?func=search&query=sysid:37334348 AB - This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security. ER -