Chapter
Section 1: Basic Concept of Security and Privacy
Chapter 2: A Practical Approach of Network Simulation
Chapter 3: Hindi Optical Character Recognition and Its Applications
Chapter 4: Android Permissions
Chapter 5: Distributed System Implementation Based on “Ants Feeding Birds” Algorithm
Section 2: Cloud and Mobile Security
Chapter 7: Digital Signature Schemes Based on Two Hard Problems
Chapter 8: Cloud Auditor Loyalty Checking Process Using Dual Signature
Chapter 9: Cloud Security Using 2-Factor Image Authentication Technique
Chapter 10: Utilizing Soft Computing Application for QOS and Security Optimization by Meta-Heuristic-Based Genetic Approach
Section 3: Cyber Security Concepts
Chapter 11: Cyber Crime and Cyber Security
Chapter 12: Pragmatic Solutions to Cyber Security Threat in Indian Context
Chapter 13: Role of Cyber Security in Today's Scenario
Chapter 14: Exploring Cyber Security Vulnerabilities in the Age of IoT
Section 4: Robotics Cyber Security Risk
Chapter 15: An Approach towards Survey and Analysis of Cloud Robotics
Chapter 16: Mobile Robotics
Chapter 17: Cloud Robotics
Chapter 18: Intelligent Agents and Autonomous Robots
Chapter 19: Survey of Recent Cyber Security Attacks on Robotic Systems and Their Mitigation Approaches
Chapter 20: Mobile Agent Communication, Security Concerns, and Approaches
Chapter 21: Cloud and Cyber Security through Crypt-Iris-Based Authentication Approach
Chapter 22: Cyber Security Risks in Robotics
Compilation of References