Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.
A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems. The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security. Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Designed for an introductory software engineering course or as a reference for programmers, this up to date text uses both theory and applications to design reliable, error-free software. Starting with an introduction to the various types of software, the book moves through life-cycle models, software specifications, testing techniques, computer-aided software engineering and writing effective source code. A chapter on applications covers software development techniques used in various applications including VisualBasic, Oracle, SQLServer, and CrystalReports. A CD-ROM with source code and third-party software engineering applications accompanies the book.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card–based systems. The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card–based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card–based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks. The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card–based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card–based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card–based systems and applications. The final chapter explains the role of blockchain technology for securing smart card–based transactions and quantum cryptography for designing secure smart card–based algorithms. Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
In this jewel-like volume, the venerable Tirtha Maharaja recounts the nectarean activities of the associates of Lord Gauranga and the acharyas of the Gaudiya Vaishnava religion." ––Swami B.P. Puri, Founder Acharya, Gopinath Gaudiya Math Srila Bhakti Ballabha Tirtha Goswami Maharaja has gathered a great deal of information about the lives of the devotees from numerous sources, and has made this information more relishable by virtue of his own insight. These biographies of Mahaprabhu's devotees should be read on their appearance and disappearance days, for this will bring great joy to both those who hear and those who read them. In this English translation, it will be possible for devotees around the world to enjoy them. Herein, the author delights in the life stories of Jagannath Mishra, Madhavendra Puri, Ishvara Puri, Advaita Acharya, Srivas Pandit, Chandrasekhar Acharya, Pundarika Vidyanidhi, Gadadhar Pandit, Vakresvara Pandit, Gadadhar Das, Shivananda Sen, Paramananda Puri, Murari Gupta, and many others. Every letter of these accounts is drenched with the nectar of devotion. The sincere seeker will never be able to enter the transcendental kingdom nor to advance in the devotional life unless they also discover this delight.
This book is meant to serve as a textbook for beginners in the field of nanoscience and nanotechnology. It can also be used as additional reading in this multifaceted area. It covers the entire spectrum of nanoscience and technology: introduction, terminology, historical perspectives of this domain of science, unique and widely differing properties, advances in the various synthesis, consolidation and characterization techniques, applications of nanoscience and technology and emerging materials and technologies.
This book examines the economic gains and social costs of agrarian transformation in India. The author looks at three phases of agrarian transformation: colonial, post- colonial, and neoliberal. This work combines macro and micro economic data, economic and noneconomic phenomena, and quantitative and qualitative aspects while exploring the context of historical and contemporary changes with special reference to Maharashtra in western India. It discusses regional disparities in agricultural development, issues of modernisation and social inequality, land owning among scheduled castes and tribes, women in agriculture, pattern of labour migration and farmer’s suicides, and documents the experiences and conditions of the rural poor and socially weaker sections to provide a comprehensive understanding of the significant changes in agrarian rural economy of western India. It also discusses contemporary development policy and practices and their consequences. Lucid and topical, this volume will be useful to scholars and researchers of agrarian studies, rural sociology, social history, agricultural economics, development studies, political economy, political studies, and public policy, as well as planning and policy experts.
The Life of Chaitanya Mahaprabhu offers a brief history of the 15th-century Vedic spiritual revolutionary, Chaitanya Mahaprabhu, who expounded Bhakti yoga, popularized the chanting of Hare Krishna, and is an incarnation of Lord Krishna. In this abridged biography of Chaitanya Mahaprabhu, Swami B. B. Bodhayan informs how Sri Krsna appeared in the form of Lord Chaitanya to deliver all fallen souls by distributing His love without discrimination. He taught his devotees how to surrender by His own example and how surrender is the soul of devotional practice. Many scriptures describe Lord Chaitanya as non-different from Lord Krsna; although Lord Chaitanya is Krsna Himself, He took the role of being His own devotee to deliver the people of the world. To spread the chanting of the holy name of the Supreme Lord, which will ultimately give us the taste of divine love, Lord Chaitanya took the renounced order (sannyasa). Thus, He gave the order to everyone to spread His name: Hare Krsna Hare Krsna Krsna Krsna Hare Hare Hare Rama Hare Rama Rama Rama Hare Hare. We have seen Lord Chaitanya, Himself, preach and inspire people to chant the Hare Krsna mahamantra. But personally, He did not give initiation. He also did not establish any temples. He taught us to spread sankirtana without having any ulterior motives. Our spiritual lineage all follow in the footsteps of Lord Chaitanya. If anyone follows the principle of “first preserve then propagate,” then one shall definitely be delivered from this material world.
The anatomy of water, water as a substance, water as a medium, the principles of the hydrologic cycle, the economics of water, and challenges are all covered in the first chapter of this book. The horizon of the tropical world, the environment, particularly the tropical environment, aquatic biome, tropical aquatic bionetwork, concept of biosphere, and tropical limnology are all covered in the second chapter. The third chapter covers the following topics: the origins of lakes, general lake classification, tropical lakes, lake morphometry, morpho-edaphic index, trophic status index of lakes, wetlands, and mangroves in tropical regions. The lotic environment is the main topic of the fourth chapter, which also covers the idea of stream order, the differences between rivers and streams, the river continuum, physical, chemical, and biological characteristics, and adaptations of fish found in hill streams. Chapter five covers the prokaryota, cyanobacteria, freshwater biota, and water-adapted organisms. The sixth chapter focuses on the algal communities Xanthophyceae, Euglenophyceae, Bacillariophyceae, Chrysophyceae, Phaeophyceae (brown algae), and Chlorophyceae. The seventh and last chapter covers the following topics: Protozoa, Porifera, Rotifera, Coelenterata, Annelida, Arthropoda, Crustacea, Aquatic Insects, Mollusca, Echinodermata, and Brachiopodaa.
The present study deals with Rural Housing Finance , The Role of Housing and Urban Development Corporation (HUDCO) Ltd., in which an attempt has been made to evaluate the operational performance of HUDCO in Rural Housing Sector in India with special reference to Orissa vis-a-vis in other states. Contents: Introduction, Housing Finance in India with Special Reference to Orissa, HUDCO A Profile of its Organisational Structure, Resource Management by HUDCO, Operational Management of HUDCO in the Rural Housing Sector in Orissa Vis-a-Vis in Other States, Operational Performance of HUDCO in the State of Orissa, Summary of Findings and Conclusions.
Compilation of keynote addresses delivered at different national and international conferences, symposiums, seminars, etc., with special reference to India.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.