SlideShare a Scribd company logo
Cyber Security for next generation Computing
Technologies 1st Edition Inam Ullah Khan download
pdf
https://ebookultra.com/download/cyber-security-for-next-generation-
computing-technologies-1st-edition-inam-ullah-khan/
Visit ebookultra.com today to download the complete set of
ebook or textbook!
We have selected some products that you may be interested in
Click the link to download now or visit ebookultra.com
for more options!.
Check Point Next Generation Security Administration 1st
Edition Syngress
https://ebookultra.com/download/check-point-next-generation-security-
administration-1st-edition-syngress/
Next Generation IPTV Services and Technologies 1st Edition
Gerard O'Driscoll
https://ebookultra.com/download/next-generation-iptv-services-and-
technologies-1st-edition-gerard-odriscoll/
E Infrastructures and Technologies for Lifelong Learning
Next Generation Environments 1st Edition George Magoulas
https://ebookultra.com/download/e-infrastructures-and-technologies-
for-lifelong-learning-next-generation-environments-1st-edition-george-
magoulas/
Security Management of Next Generation Telecommunications
Networks and Services 1st Edition Stuart Jacobs(Auth.)
https://ebookultra.com/download/security-management-of-next-
generation-telecommunications-networks-and-services-1st-edition-
stuart-jacobsauth/
Next Generation SOA A Real World Guide to Modern Service
Oriented Computing 1st Edition Thomas Erl
https://ebookultra.com/download/next-generation-soa-a-real-world-
guide-to-modern-service-oriented-computing-1st-edition-thomas-erl/
Digital Security Cyber Terror and Cyber Security The
Digital World 1st Edition Ananda Mitra
https://ebookultra.com/download/digital-security-cyber-terror-and-
cyber-security-the-digital-world-1st-edition-ananda-mitra/
Cyber Security and Network Security 1st Edition Sabyasachi
Pramanik
https://ebookultra.com/download/cyber-security-and-network-
security-1st-edition-sabyasachi-pramanik/
Computational Methods for Next Generation Sequencing Data
Analysis 1st Edition Ion Mandoiu
https://ebookultra.com/download/computational-methods-for-next-
generation-sequencing-data-analysis-1st-edition-ion-mandoiu/
Cyber Security 1st Edition Jocelyn O. Padallan
https://ebookultra.com/download/cyber-security-1st-edition-jocelyn-o-
padallan/
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for next generation Computing
Technologies 1st Edition Inam Ullah Khan Digital Instant
Download
Author(s): InamUllah Khan, Abou el Houba,Maria Ouaissa
ISBN(s): 9781003404361, 1003404367
Edition: 1
File Details: PDF, 8.96 MB
Year: 2024
Language: english
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for
Next-Generation
Computing Technologies
This book sheds light on the cyber security challenges associated with next-
generation computing technologies, emphasizing the serious threats posed to
individuals, businesses, and nations. With everything becoming increasingly
interconnected via the Internet, data security becomes paramount. As technology
advances, people need to secure their data communication processes. Personal data
security, including data integrity and confidentiality, is particularly vulnerable.
Therefore, the concept of cyber security forensics emerges to ensure data security for
everyone, addressing issues such as data control, hijacking, and threats to personal
devices such as mobile phones, laptops, and other smart technologies. This book
covers key topics related to cyber security in next-generation computing technologies,
ultimately enhancing the quality of life for citizens, facilitating interaction with smart
governments, and promoting secure communication processes.
KEY FEATURES
• Highlights innovative principles and practices using next generation
computing technologies based cybersecurity.
• Presents an introduction to recent trends regarding the convergence of
AI/ML in cybersecurity
• Offers an overview of theoretical, practical, simulation concepts of
cybersecurity
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
Cyber Security for
Next-Generation
Computing Technologies
Edited by Inam Ullah Khan, Mariya Ouaissa,
Mariyam Ouaissa, Zakaria Abou El Houda,
and Muhammad Fazal Ijaz
Boca Raton London New York
CRC Press is an imprint of the
Taylor & Francis Group, an informa business
Designed cover image: Shutterstock
First edition published 2024
by CRC Press
2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431
and by CRC Press
4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
CRC Press is an imprint of Taylor & Francis Group, LLC
© 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa,
Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors
Reasonable efforts have been made to publish reliable data and information, but the author and
publisher cannot assume responsibility for the validity of all materials or the consequences of
their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and
let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information
storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access www.
copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive,
Danvers, MA 01923, 978–750–8400. For works that are not available on CCC please contact
mpkbookspermissions@tandf.co.uk
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are
used only for identification and explanation without intent to infringe.
ISBN: 978-1-032-51899-2 (hbk)
ISBN: 978-1-032-51900-5 (pbk)
ISBN: 978-1-003-40436-1 (ebk)
DOI: 10.1201/9781003404361
Typeset in Times
by Apex CoVantage, LLC
v
Contents
Preface......................................................................................................................vii
About the Editors......................................................................................................ix
List of Contributors................................................................................................ xiii
Chapter 1 Cyber Security: Future Trends and Solutions ......................................1
Syed Immamul Ansarullah, Mudasir Manzoor Kirmani,
Ziema Mushtaq, and Gowhar Mohi ud din Dar
Chapter 2 Security and Intelligent Management: Survey................................... 16
Zaigham Abbas, Abdul Qahar Shahzad, Muhammad
Yaseen Ayub, and Muhammad Allah Rakha
Chapter 3 Comparative Analysis of Machine and Deep Learning
for Cyber Security..............................................................................39
Hafsa Maryam, Syeda Zillay Nain Zukhraf,
and Rehmat Ullah
Chapter 4 AI-Based Secure Wireless Communication Technologies and
Cyber Threats for IoT Networks ........................................................70
Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan,
and Salma El Hajjami
Chapter 5 Cyber Threat Actors Review: Examining the Tactics
and Motivations of Adversaries in the Cyber Landscape ..................84
Zakaria Abou El Houda
Chapter 6 Layer-Based Security Threats in IoT Networks...............................102
Muna Muhammad, Ahthasham Sajid, and Hira Arshad
Chapter 7 Intrusion Detection System Using AI and
Machine Learning Algorithm..........................................................120
Muhammad Tehmasib Ali Tashfeen
Chapter 8 Signature-Based Intrusion Detection System for IoT....................... 141
Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan,
and Muhammad Fayaz
vi Contents
Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the
MQTT-IoT-IDS2020 Dataset............................................................ 159
Zupash, Muhammad Allah Rakha, Inam Ullah Khan,
Mariya Ouaissa, Mariyam Ouaissa, and
Muhammad Yaseen Ayub
Chapter 10 Cyber Security for Edge/Fog Computing Applications................... 177
Hanane Lamaazi
Chapter 11 Cyber Attacks Against Intelligent Transportation Systems.............190
Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid
Chapter 12 Intelligent Transportation Systems for IoT-Based
UAV Networks.................................................................................. 231
Mamoona Jamil, Usman Haider, Inam Ullah Khan,
and Tarandeep Kaur Bhatia
Chapter 13 Cyber Attack Detection Analysis Using Machine Learning
for IoT-Based UAV Network ............................................................253
Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub,
Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia,
and Inam Ullah Khan
Chapter 14 Blockchain Solutions for Cyber Criminals ......................................265
Vijendra Kumar Maurya, Denis Jangeed, Latif Khan,
and Bhupendra Kumar Soni
Chapter 15 Blockchain Security Measures to Combat Cyber Crime ................. 275
Rahmeh Ibrahim and Qasem Abu Al-Haija
Chapter 16 AI Classification Algorithms for Human Activities
Recognition System With a Cyber Security Perspective .................294
Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar,
Aliyu Yusuf, Salman Khan, and Inam Ullah Khan
vii
Preface
The field of cyber security has recently gained significant importance as the chal-
lenge of securing information transmission becomes crucial. The advent of smart
IT infrastructure has revolutionized the global landscape, but it has also brought
forth security concerns. Consequently, cyber crimes have witnessed a steady rise
over time, involving activities such as identity theft, bullying, terrorism, and network
disruptions. In this smart world, privacy and security have become indispensable for
individuals. Fortunately, the next generation of computing technologies, including
IoT/IoE, artificial intelligence, machine learning, deep learning, smart grid, ad hoc
networks, SDN, network security, big data, image processing, and green communi-
cation, offers potential solutions.
The integration of these fields encompasses cyber attacks, forensic analysis, and
privacy issues, necessitating exploration through optimization techniques and evolu-
tionary computations. Next-generation computing finds diverse applications in areas
like smart infrastructure, air quality monitoring, waste management, school man-
agement, healthcare, and telemedicine. These applications rely on security measures
to facilitate optimal decision making in real time. Ad hoc networks play a crucial
role in reducing end-to-end delays and connectivity problems, while wireless com-
munication technology serves as the backbone of future networks. Governments,
enterprises, and individuals must prioritize cyber security and utilize forensic tech-
niques to protect data when sharing it with others, as privacy concerns arise due
to potential security breaches during extensive data sharing. Analyzing complex
information and real-time data is essential for ensuring the sustainability of future
networks and related applications.
This book sheds light on the cyber security challenges associated with next-
generation computing technologies, emphasizing the serious threats posed to individ-
uals, businesses, and nations. With everything becoming increasingly interconnected
via the Internet, data security becomes paramount. As technology advances, people
need to secure their data communication processes. Personal data security, including
data integrity and confidentiality, is particularly vulnerable. Therefore, the concept
of cyber security forensics emerges to ensure data security for everyone, addressing
issues such as data control, hijacking, and threats to personal devices such as mobile
phones, laptops, and other smart technologies. This book covers key topics related
to cyber security in next-generation computing technologies, ultimately enhancing
the quality of life for citizens, facilitating interaction with smart governments, and
promoting secure communication processes.
Chapter 1 provides an overview of cyber security, exploring its impact on busi-
nesses and analyzing recent trends and future solutions. Chapter 2 focuses on
security and intelligent management to ensure system safety. Chapter 3 presents a
comprehensive study of machine learning (ML) and deep learning (DL) techniques
for detecting potential cyber attacks, while Chapter 4 surveys AI-based applications,
intrusion detection systems (IDS), cyber attacks on IoT networks, and AI tools.
viii Preface
Chapter 5 aims to investigate the tactics and motivations of cyber threat actors in
the current cyber security landscape, while Chapter 6 conducts a detailed review of
security threats and attacks across different layers of IoT systems. Chapter 7 demon-
strates how an intrusion detection system using AI and ML can function effectively
out of the box, and Chapter 8 provides a detailed survey on signature-based IDS for
IoT environments. In Chapter 9, a hybrid model is proposed for identifying attacks
on IoT-enabled smart cities.
Chapter 10 offers an overview of cyber security in edge/fog computing applica-
tions, highlighting potential risks, common attack vectors, and best practices for
security. Chapter 11 explores various cyber security attacks targeting intelligent
transportation systems (ITS), including phishing attacks, malware, remote access,
denial of service (DoS) attacks, physical attacks, insider threats, and social engi-
neering. Chapter 12 presents a comprehensive survey of security attacks in UAV
networks and other intelligent transportation systems, while Chapter 13 conducts a
comparative study of machine learning techniques to investigate trust in IoT-based
aerial ad hoc networks.
Chapter 14 delves into the applications of blockchain technology in cyber security
and the security solutions it offers, while Chapter 15 expands on blockchain con-
cepts, components, architecture, features, types, and limitations. Lastly, Chapter 16
focuses on human activity recognition problems from a cyber security perspective,
proposing a novel method for accurate human activity recognition through different
algorithms.
ix
About the Editors
Dr. Inam Ullah Khan is a visiting researcher at King’s College London, UK. Dr. Khan
was a lecturer at different universities in Pakistan, including the Center for Emerging
SciencesEngineering&Technology(CESET),Islamabad,AbdulWaliKhanUniversity,
Garden and Timergara Campus, and University of Swat. He did his PhD in Electronics
Engineering from the Department of Electronic Engineering, Isra University, Islamabad
Campus, School of Engineering & Applied Sciences (SEAS). He completed his MS
degree in Electronic Engineering at the Department of Electronic Engineering, Isra
University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He
obtained his undergraduate degree in Bachelor of Computer Science from Abdul Wali
Khan University Mardan, Pakistan. In addition, his master’s thesis was published as a
book, Route Optimization with Ant Colony Optimization (ACO) (Lambert Academic
Publishing, 2017), in Germany, which is available on Amazon. He is a research scholar
and has published research papers at the international level. More interestingly, he
recently introduced a novel on routing protocol E-ANTHOCNET in the area of flying
ad hoc networks. His research interests include network system security, intrusion detec-
tion, intrusion prevention, cryptography, optimization techniques, WSN, IoT, UAVs,
mobile ad hoc networks (MANETS), flying ad hoc networks, and machine learning.
He has served at international conferences as a technical program committee mem-
ber, which include the EAI International Conference on Future Intelligent Vehicular
Technologies, Islamabad, Pakistan, and the 2nd International Conference on Future
Networks and Distributed Systems, Amman, Jordan, June 26–27, 2018, and has been
recently working on the same level at the International Workshop on Computational
Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held
in conjunction with the 12th International Conference on Ambient Systems, Networks
and Technologies (EUSPN 2021), which was co-organized in November 1–4, 2021,
in Leuven, Belgium. He has published more than 20 research papers (including book
chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts)
and three edited books.
Dr. Mariya Ouaissa is currently a Professor in Cybersecurity and Networks at Cadi
Ayyad University and a practitioner with industry and academic experience. She
obtained a PhD in 2019 in Computer Science and Networks, at the Laboratory of
Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail
University, Meknes, Morocco. She is a Networks and Telecoms Engineer, hav-
ing graduated in 2013 from the National School of Applied Sciences, Khouribga,
Morocco. She is a co-founder and IT consultant at the IT Support and Consulting
Center. She worked for the School of Technology of Meknes Morocco as Visiting
Professor from 2013 to 2021. She is a member of the International Association of
Engineers and International Association of Online Engineering, and since 2021, she is
an ACM Professional Member. She is Expert Reviewer with the Academic Exchange
Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has
served and continues to serve on technical program and organizer committees of
x About the Editors
several conferences and events and has organized many symposiums/workshops/
conferences as a general chair and as a reviewer of numerous international jour-
nals. Dr. Ouaissa has made contributions in the fields of information security and
privacy, Internet of Things security, and wireless and constrained networks secu-
rity. Her main research topics are IoT, M2M, D2D, WSN, cellular networks, and
vehicular networks. She has published over 40 papers (book chapters, international
journals, and conferences/workshops), ten edited books, and eight special issues as
guest editor.
Dr. Mariyam Ouaissa is currently Assistant Professor of Networks and Systems at
Chouaib Doukkali University. She received her PhD degree in 2019 from the National
Graduate School of Arts and Crafts, Meknes, Morocco, and her Engineering Degree
in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She
is a communication and networking researcher and practitioner with industry and
academic experience. Dr. Ouaissa’s research is multidisciplinary and focused on the
Internet of Things, M2M, WSN, vehicular communications and cellular networks,
security networks, congestion overload problems, and resource allocation manage-
ment and access control. She is serving as a reviewer for international journals and
conferences, including IEEE access, wireless communications, and mobile com-
puting. Since 2020, she is a member of the International Association of Engineers
IAENG and International Association of Online Engineering, and since 2021, she
is an ACM Professional Member. She has published more than 30 research papers
(this includes book chapters, peer-reviewed journal articles, and peer-reviewed con-
ference manuscripts), ten edited books, and six special issue as guest editor. She has
served on program committees and organizing committees of several conferences
and events and has organized many symposiums/workshops/conferences as a gen-
eral chair.
Dr. Zakaria Abou El Houda is a researcher at the Université de Montréal,
Montréal, Canada. He received an MSc degree in Computer Networks from Paul
Sabatier University, Toulouse, France, his PhD degree in Computer Science from the
University of Montréal, Canada, and PhD degree in Computer Engineering from the
University of Technology of Troyes, Troyes, France. He has made contributions in
the fields of information security, intrusion detection/prevention system, and security
in software-defined networks. His current research interests include ML/DL-based
intrusion detection, federated learning, and blockchain. He has also served and con-
tinues to serve on technical program committees and as a reviewer of several inter-
national conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE
Transactions.
Dr. Muhammad Fazal Ijaz received his BEng degree in Industrial Engineering
and Management from University of the Punjab, Lahore, Pakistan, in 2011, and his
DrEng degree in Industrial and Systems Engineering from Dongguk University,
Seoul, South Korea, in 2019. From 2019 to 2020, he worked as Assistant Professor in
the Department of Industrial and Systems Engineering, Dongguk University, Seoul,
South Korea. Currently, he is working as Assistant Professor in the Department of
xi
About the Editors
Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has pub-
lished numerous research articles in several international peer-reviewed journals,
including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE
Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability.
His research interests include machine learning, blockchain, healthcare engineering,
the Internet of Things, big data, and data mining.
Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan
xiii
Contributors
Zaigham Abbas
International Islamic University
Islambad, Pakistan
Qasem Abu Al-Haija
Princess Sumaya University for
Technology
Jordan
Syed Immamul Ansarullah
Government Degree College Sumbal
Srinagar, India
Hira Arshad Baluchistan
University of Information Technology
Engineering and Management Sciences
Quetta, Baluchistan, Pakistan
Muhammad Yaseen
Ayub COMSATS University
Attock Campus, Pakistan
Tarandeep Kaur Bhatia
University of Petroleum and Energy
Studies (UPES)
Bidholi, India
Gowhar Mohi ud din Dar
Lovely Professional University
Phagwara, India
Salma El Hajjami
Ibnou Zohr University Agadir
Morocco
Zakaria Abou El Houda
L@bISEN, ISEN Yncréa Ouest
Carquefou, France
Muhammad Fayaz
University of Central Asia Naryn
Kyrgyzstan
Usman Haider
National University of Computer and
Emerging Sciences
Islamabad, Pakistan
Rahmeh Ibrahim
Princess Sumaya University for
Technology
Jordan
Shahbaz Ali
Imran Birmingham City University
Birmingham, UK
Mamoona Jamil
Isra University Islamabad
Pakistan
Denis Jangeed
Geetanjali Institute of Technical Studies
Udaipur, India
Aftab Alam Janisar
Universiti Teknologi Petronas
Seri Iskandar, Perak, Malaysia
Inam Ullah Khan
Isra University Islamabad Campus
Pakistan
Latif Khan
Geetanjali Institute of Technical
Studies
Udaipur, India
Salman Khan
Abdul Wali Khan University Mardan
Pakistan
Mudasir Manzoor Kirmani
FoFy, SKAUST-Kashmir
India
xiv Contributors
Hanane Lamaazi
College of Information Technology
UAE University, Abu Dhabi,
United Arab Emirates
Hafsa Maryam
University of Cyprus
Nicosia, Cyprus
Vijendra Kumar Maurya
Geetanjali Institute of Technical Studies
Udaipur, India
Muna Muhammad
Baluchistan University of Information
Technology Engineering and
Management Sciences
Quetta, Baluchistan, Pakistan
Ziema Mushtaq
Cluster University Srinagar
India
Fahad Naveed
Federal Urdu University of Arts Science
& Technology
Islamabad, Pakistan
Bakhtawar Nawaal
University of Engineering and
Technology
Taxila, Pakistan
Mariya Ouaissa
Cadi Ayyad University
Marrakech, Morocco
Mariyam Ouaissa
Chouaib Doukkali University
El Jadida, Morocco
Muhammad Allah Rakha
FAST National University
Peshawar, Pakistan
Ahthasham Sajid
Baluchistan University of Information
Technology Engineering and
Management Sciences
Quetta, Baluchistan, Pakistan
Abdul Qahar Shahzad
Quaid-I-Azam University
Islamabad, Pakistan
Hina Shoukat
COMSATS University Islamabad
Attock, Pakistan
Bhupendra Kumar Soni
Geetanjali Institute of Technical
Studies
Udaipur, India
Muhammad Tehmasib Ali Tashfeen
Wichita State University
Wichita, Kansas, United States
Rehmat Ullah
Cardiff Metropolitan University
Cardiff, UK
Ubaid Ullah
University of Wah
Wah Cantt, Pakistan
Muhammad Usama
University of Wah
Wah Cantt, Pakistan
Aliyu Yusuf
Universiti Teknologi Petronas
Seri Iskandar, Perak, Malaysia
Syeda Zillay Nain Zukhraf
University of Cyprus,
Nicosia, Cyprus
Department of Electrical Engineering
National University of Computer and
Emerging Sciences
Peshawar, Pakistan
Zupash
COMSATS University Islamabad
Attock, Pakistan
1
DOI: 10.1201/9781003404361-1
Cyber Security
1 Future Trends and Solutions
Syed Immamul Ansarullah, Mudasir Manzoor
Kirmani, Ziema Mushtaq, and Gowhar Mohi
ud din Dar
1.1 INTRODUCTION
Before the beginning of 1970, viruses, Trojan horses, worms, spyware, and malware
were not even part of the mainstream lexicon of information technology. Robert
Thomas, a BBN Technologies researcher in Cambridge, Massachusetts, created the
first computer “worm” and named that “Creeper” [1]. By jumping between systems,
the Creeper disseminated infection; to combat this virus, Ray Tomlinson created
the Reaper, the first antivirus application that would seek out and destroy Creeper
[2]. In 1988, Robert Morris desired to determine the magnitude of the Internet and
to accomplish this, he developed software that accessed UNIX terminals, traversed
networks, and cloned itself. The Morris worm was so destructive that it rendered
computers unusable by substantially reducing their speed [3]. From that moment on,
viruses became more lethal, pervasive, and difficult to manage. With it came the
advent of cyber security.
The collective set of technology, methods, and procedures that businesses utilize
to safeguard their computing environments from harm and unauthorized data access
caused by online criminals or nefarious insiders is known as cyber security [4].
Organizations typically have a structure and system in place for dealing with attempted
or successful cyber attacks. An effective framework can aid in threat detection and
identification, network and system protection, and recovery in the event that an attack
is successful. Cybersecurity is included in all systems that are vulnerable to threats
and attacks to stop things like identity theft, cyber stalking, data loss, loss of sensitive
data, and extortion attempts [5]. Sensitive information about themselves as well as their
clients is held by critical infrastructures, including hospitals, financial services firms,
power plants, etc. To operate without interruption, cyber threat researchers find new
vulnerabilities, improve open-source tools, and inform people about the significance
of cyber security. Since the introduction of the first mainframes, the CIA (confiden-
tiality, integrity, and availability) triangle has been the de facto industry standard for
computer security [6]. Figure 1.1 shows the CIA triad in cybersecurity.
• Confidentiality: Maintaining confidentiality requires not divulging infor-
mation to unauthorized parties. It involves making an effort to safeguard
the privacy and anonymity of authorized parties engaged in data sharing
2 Cyber Security for Next-Generation Computing Technologies
and storage. Decrypting data that has been inadequately encrypted, man-
in-the-middle (MITM) attacks, and disclosing sensitive information fre-
quently compromise secrecy. Data encryption, two-factor authentication,
biometric verification, security tokens, and other standard procedures are
utilized to protect confidentiality.
• Integrity: Integrity relates to preventing unauthorized parties from
altering information. It is required that information and programs can
only be modified in certain and authorized ways. Integrity risks include
turning a computer into a “zombie computer” and infecting online pages
with malware. Typically, the following methods are used to ensure data
integrity: cryptographic checksums, uninterrupted power supplies, data
backups, etc.
• Availability: Availability ensures that the information is accessible to
authorized users when required. Data is only helpful if it is accessible to the
right people at the right time. Information inaccessibility may result from
security vulnerabilities such as DDoS attacks, hardware failure, poor soft-
ware, or human error. Common practices for ensuring availability include
backing up data to external drives, installing firewalls, having a backup
power supply, and replicating data.
FIGURE 1.1 CIA (confidentiality, integrity, and availability) triad in cyber security.
3
Cyber Security
1.2 TYPES OF CYBER SECURITY
Cyber security can broadly be divided into seven pillars [7–9]:
1. Network Security: A planned set of guidelines and configurations is used
to secure networks and data by ensuring their confidentiality, integrity, and
accessibility. By safeguarding the infrastructure, network security aims to
defend internal networks from intruders. The majority of attacks take place
across networks, and network security solutions are made to spot and stop
these attacks. These solutions incorporate data and access controls, includ-
ing next-generation firewall (NGFW) application restrictions, network
access control (NAC), data loss prevention (DLP), identity access manage-
ment (IAM), and NAC (identity access management), to enact safe online
use regulations. Technologies for advanced and multilayered network threat
prevention include NGAV (next-gen antivirus), sandboxing, and CDR (con-
tent disarm and reconstruction). Additionally significant are automated
SOAR (security orchestration and response) solutions, threat hunting, and
network analytics [10].
2. Cloud Security: Technology, services, controls, and policies that safe-
guard cloud data, infrastructure, and applications against online threats and
attacks are referred to as cloud security [11]. Although a lot of cloud service
providers offer security solutions, these are sometimes insufficient for pro-
viding enterprise-grade security in the cloud. Amazon AWS and Microsoft
Azure are two examples of public cloud computing, while VMmare or
OpenStack are examples of private clouds. The multi-cloud aspect of cloud
security presents several unique issues, including visibility, compliance,
and cost control. Enabling MFA on all accounts, enabling security logs,
encrypting your data, and double-checking your compliance needs are the
standard procedures to take into account for cloud security.
3. Mobile Security: Mobile security, also referred to as wireless security, is
the safeguard put in place to protect mobile devices like laptops, tablets,
and smartphones, as well as the networks to which they are linked, from the
dangers and risks associated with wireless computing [12]. Mobile devices
like tablets and smartphones, which are frequently disregarded, have access
to company data, putting firms at risk from phishing, malicious software,
and IM (instant messaging) assaults. These attacks are stopped by mobile
security, which also protects operating systems and devices from rooting.
This enables businesses to guarantee that only compliant mobile devices
have access to company assets when combined with an MDM (mobile
device management) solution.
4. Endpoint Security: Companies must protect end user devices like desk-
tops/laptops and servers, mobile devices, network devices (routers, switches,
and access points) with endpoint detection and response (EDR) solutions,
advanced threat prevention (such as anti-phishing and anti-ransomware),
and data and network security controls [13].
4 Cyber Security for Next-Generation Computing Technologies
5. IoT Security: Although deploying Internet of Things (IoT) devices undoubt-
edly increases productivity, it also exposes businesses to new online threats.
Threat actors look for weak devices that are unintentionally connected to
the Internet in order to utilize them for illicit purposes like gaining access
to corporate networks. With the help of auto-segmentation to manage net-
work activity, discovery and classification of connected devices, and the use
of IPS as a virtual patch to thwart attacks on susceptible IoT devices, IoT
security safeguards these gadgets [14]. To guard against exploits and run-
time attacks, the firmware of the device may in some situations be supple-
mented with tiny agents.
6. Application Security: Addressing vulnerabilities originating from unsafe
development procedures when creating, coding, and releasing software or
a website is known as application security. It is crucial to integrate security
standards, procedures, methods, and tools to safeguard applications dur-
ing all phases of development because applications are directly accessible
across networks. Cross-site scripting (XSS), DDoS attacks, lax access con-
trols, a lack of encryption, etc. are problems with application security [15].
Risk assessment, patching, secure development, web application firewalls,
encryption software, and application security testing are some of the proce-
dures and solutions to take into consideration for this kind of cyber security.
7. Zero Trust: Zero trust security, which takes a more granular approach
to security by securing specific resources through a mix of micro-
segmentation, monitoring, and the implementation of role-based access
controls, means that, by default, no one is trusted from inside or outside the
network [16]. Continuous monitoring and validation, least privilege, device
access control, micro-segmentation, preventing lateral movement, and mul-
tifactor authentication are the core tenets of zero trust.
1.3 CYBER SECURITY THREATS
The main types of cyber security threats that companies face today are discussed
next.
1.3.1 MALWARE
Malware is malicious software designed to perform a range of unwanted tasks on a
compromised machine [17]. Some of the most common kinds of malicious software are:
• Ransomware: Files on a device infected with ransomware are encrypted
using a key known only to the attacker. The creator of the ransomware
then asks money in exchange for the decryption key [18]. Ransomware has
become one of the most widespread and expensive cyber dangers that busi-
nesses face in recent years.
• Trojan Horse: Trojan horses are a type of malicious software that can trick
users into downloading it by seeming to be a legitimate, free version of a
5
Cyber Security
paid program. After a victim downloads and runs the Trojan, it will begin
performing malicious actions on the infected machine [19].
• Remote Access Trojan (RAT): Trojans designed to serve as a backdoor
for additional attacks are known as remote access Trojans (RATs). Once
the virus is active on an infected machine, the attacker gains access to the
system remotely and can then steal data, install further malware, or execute
other malicious activities [20].
• Spyware: Spyware is a form of malware that monitors a user’s activity on
their computer and records that data. Hackers create spyware to gain access
to private information that may be sold or used in future assaults [21]. This
information can include login credentials, financial data, and other sensitive
details.
• Cryptojacking: In order to add new blocks to the blockchain, Proof of
Work (PoW) cryptocurrencies require a computationally intensive process
called mining. In order to mine cryptocurrency, cryptojacking malware
installs itself on a compromised computer and uses its processing power to
create blocks [22].
1.3.2 SOCIAL ENGINEERING ATTACKS
Social engineering attacks involve deception, compulsion, and other forms of psy-
chological manipulation to persuade the target to perform the desired action. Typical
instances of social engineering techniques are as follows:
• Phishing: Phishing is one form of social engineering in which the target is
tricked into providing information or doing some other action that benefits
the attacker [23]. The goal of phishing is to trick users (using emails, social
media posts, and other kinds of electronic communication) into visiting a
harmful website, downloading a malicious file, or providing personal infor-
mation such as passwords.
• Spear Phishing: Spear phishing assaults are a type of phishing in which
the attacker tries to trick a specific person or group into giving over sensitive
information by posing as a trustworthy organization [24]. A spear phishing
email sent to the accounts payable clerk can, for instance, falsely claim to
be from one of the company’s legitimate vendors or suppliers, demanding
payment for goods or services already rendered.
• Smishing: What we call “smishing” attacks originate from “phishing,”
except they use text messages instead of email [25]. These attacks take
advantage of smartphone features, such as the ability to hover the mouse
over an SMS link to see where it leads and the prevalence of link shortening
services (like bit.ly).
• Vishing (Voice-Based Phishing): Vishing uses similar techniques to
phishing but takes place over the phone. Convincing a victim to do a mali-
cious action or reveal private information like passwords or credit card
numbers is an attack technique [26].
Random documents with unrelated
content Scribd suggests to you:
© Triangle Film Corp. (C. Gardner Sullivan, author); 23Jan16;
LP10729.
THE CONQUEROR. 1917. For Fox Film Corp. 8 reels. Based on the
life of Sam Houston.
Credits: Scenario and direction, R. A. Walsh; story, Henry
Christeen Warnack.
© William Fox (Raoul Walsh, author); 9Sep17; LP11362.
THE CONQUERORS. 1932. 9 reels.
Credits: Director, William A. Wellman; story, Howard Estabrook;
screenplay, Robert Lord.
© RKO Radio Pictures, Inc.; 18Nov32; LP3453.
CONQUEST. Trailer announcement, 1928. 1 reel, sd.
Credits: Musical director, Louis Silvers.
© The Vitaphone Corp.; 29Dec28; MP5668.
CONQUEST. 1928. 8 reels. From the novel by Mary Imlay Taylor.
Credits: Director, Roy del Ruth; screenplay, C. Graham Baker;
adaptation, Eve Unsell.
© Warner Bros. Pictures, Inc.; 18Dec28; LP25927.
CONQUEST. A Clarence Brown production. 1937. 6 reels, sd., b&w.
Based on a book by Waclaw Gasiorowski and a dramatization by
Helen Jerome.
Credits: Producer, Bernard H. Hyman; director, Clarence Brown;
screenplay, Samuel Hoffenstein, Salka Viertel, S. N. Behrman;
film editor, Tom Held; music score, Herbert Stothart.
© Metro-Goldwyn-Mayer Corp.; 26Oct37; LP7547.
THE CONQUEST OF CANAAN. 1921. 7 reels. From the story by
Booth Tarkington.
Credits: Director, R. William Neill; scenario, Frank W. Tuttle.
© Famous Players-Lasky Corp.; 20Aug21; LP16883.
THE CONQUEST OF CLAIRE. © 1914.
© Pathé Frères (Messter Film Co., author); title, descr. & 72
prints, 27Apr14; LU2593.
THE CONQUEST OF CONSTANTIA. 1915. 1 reel.
Credits: Director, Courtlandt Van Deusen.
© The Vitagraph Co. of America (W. A. Tremayne, author);
11Nov15; LP6949.
THE CONQUEST OF NEW FRANCE. SEE The Gateway to the West.
Wolfe and Montcalm.
CONQUEST OF THE HUDSON. © 1938. 2 reels.
© The Port of New York Authority (Marion Sanders, author);
title, descr. & 13 prints, 19Jan38; MU8081.
CONRAD IN QUEST OF HIS YOUTH. 1920. 6 reels. From the novel
by Leonard Merrick.
Credits: Director, William De Mille; scenario, Olga Printzlau.
© Famous Players-Lasky Corp.; 8Nov20; LP15788.
CONRAD NAGEL [in] VITAPHONE TRAILER ANNOUNCEMENT,
CAUGHT IN THE FOG. 1928. 1 reel, sd.
© Warner Brothers Pictures, Inc.; 12Sep28; MP5351.
CONRAD NAGEL [in] VITAPHONE TRAILER ANNOUNCEMENT,
LIGHTS OF NEW YORK. 1928. 1 reel, sd.
© Warner Bros. Pictures, Inc.; 30Jul28; MP5228.
CONSCIENCE. Imp. 1915. 4 reels.
Credits: Curtis Benton; production and scenario, Stuart Paton.
© Universal Film Mfg. Co., Inc.; 18Jun15; LP5612.
CONSCIENCE. 1917. For Fox Film Corp. 6 reels.
Credits: Director, Bertram Bracken; story, J. Searle Dawley, E.
Lloyd Sheldon; scenario, Adrian Johnson.
© William Fox (J. Searle Dawley & E. Lloyd Sheldon, authors);
6Oct17; LP11504.
CONSCIENCE. SEE Trust Your Wife.
CONSCIENCE AND THE TEMPTRESS. © 1914.
© Selig Polyscope Co. (Malcolm Douglas, author); title, descr. &
31 prints, 7Jan14; LU1921.
THE CONSCIENCE FUND. © 1913.
© Selig Polyscope Co. (Gilson Willets, author); title, descr. & 64
prints, 8Oct13; LU1351.
THE CONSCIENCE OF HASSAN BEY. © 1913.
© Biograph Co. (W. C. Cabanne, author); title, descr. & 77
prints, 15Dec13; LU1802.
CONSCIENTIOUS CAROLINE. 1914. 1 reel.
Credits: Ashley Miller.
© Thomas A. Edison, Inc.; 16May14; LP2719.
CONSCRIPTION. SEE Her Boy.
CONSECRATION OF MATAOS II. FUNERAL OF MATAOS II. © 1912.
© Kachadoor H. Mesropian (A. M. Sebastianske, author); title,
descr. & 4 prints, 7Oct12; LU57.
CONSERVATION OF NATURAL RESOURCES. 1938. 1 reel.
© Erpi Classroom Films, Inc. (Wallace W. Atwood, author);
1Jan38; MP8284.
CONSERVING THE INSURANCE ESTATE. 1932. Filmstrip.
© The Northwestern Mutual Life Insurance Co. (Nelson D.
Phelps & R. P. Thierbach, authors); 8Sep32; MP3967.
CONSOLATION MARRIAGE. 1931. 9 reels, sd.
Credits: Associate producer, Myles Connolly; director, Paul
Sloane; original story, Bill Cunningham; screenplay and dialogue,
Humphrey Pearson.
© RKO Radio Pictures, Inc.; 17Oct31; LP2579.
CONSPIRACY; or, A FOUR MILLION DOLLAR DOWRY. © 1914.
© Société Française des Films et Cinématographes Éclair, Inc.;
title, descr. & 87 prints, 9Feb14; LU2115.
THE CONSPIRACY. Bison. 1916. 2 reels.
Credits: William Parker; director, Henry McRae.
© Universal Film Manufacturing Co., Inc., 5Oct16; LP9250.
CONSPIRACY. 1930. 7 reels, sd. From the stage play by Robert
Baker and John Emerson.
Credits: Producer, William LeBaron; director, Christy Cabanne;
assistant director, Dewey Starkey; screenplay, continuity and
dialogue, Beulah Marie Dix; film editors, Artie Roberts, Sam
White.
© RKO Productions, Inc.; 27Jul30; LP1452.
CONSPIRACY. 1939. 59 min., sd.
Credits: Production executive, Lee Marcus; producer, Cliff Reid;
director, Lew Landers; story, John McCarthy, Faith Thomas;
screenplay, Jerome Chodorov; film editor, George Hively; music
director, Frank Tours.
© RKO Radio Pictures, Inc.; 8Sep39; LP9155.
THE CONSPIRACY AT THE CHATEAU. 1915. 2 reels.
Credits: Edwin Balmer.
© Essanay Film Mfg. Co.; 14Apr15; LP5020.
THE CONSPIRATORS. © 1914. 35 mm.
Credits: Robert Gage.
© Selig Polyscope Co. (Robert Gage, author); title, descr. & 49
prints, 22Jan14; LU2001.
THE CONSTABLE'S DAUGHTER. © 1915.
© American Film Mfg. Co. (J. E. Hungerford, author); title, descr.
& 58 prints, 6Mar15; LU4628.
THE CONSTABULE. 1929. 22 min., sd.
Credits: Director, Mack Sennett; story and dialogue, John A.
Waldron.
© Mack Sennett, Inc.; 24Sep29; LP712.
THE CONSTANCY OF JEANNE; or, LA JOLIE BRETONNE. © 1914.
© Pathé Frères; title, descr. & 39 prints, 13Mar14; LU2306.
THE CONSTANT NYMPH. Gaumont British Picture Corp. 1934.
7,666 ft., sd. From the novel by Margaret Kennedy.
Credits: Director, Basil Dean; screenplay, Dorothy Farnum;
dialogue, Margaret Kennedy, Basil Dean; music directors, Eugene
Gossen, John Greenwood.
© Fox Film Corp.; 23Mar34; LP4579.
THE CONSTANT WOMAN. World Wide. Presented by E. W.
Hammons. 1933. 76 min., sd. From the play "Recklessness" by
Eugene O'Neill.
Credits: Director, Victor Schertzinger; screenplay, Warren Duff;
adaptation, F. Hugh Herbert.
© KBS Productions, Inc.; 18Mar33; LP3990.
CONSTANTINOPLE. SEE Christian Crusaders in Constantinople.
CONTACT. 1932. 1 reel.
Credits: Director, Joseph Henabery; story, Sig Herzig, Burnet
Hershey.
© The Vitaphone Corp.; 21Sep32; LP3286.
CONTENT. (Herbert Kaufman's Weekly) 1920. 1 reel.
Credits: Herbert Kaufman; director, Wray Physioc; scenario,
Merle Johnson.
© Selznick Pictures Corp.; 1May20; LP15074.
CONTENTED CALVES. 1934. 2 reels, sd.
Credits: Producer, Lou Brock; director, Sam White; story, Joseph
A. Fields, Rolly Asher; film editor, Edward Mann.
© RKO Radio Pictures, Inc.; 6Aug34; LP4869.
CONTENTED WIVES. (Cameo Comedy) 1929. 1 reel.
Credits: Director, Francis J. Martin.
© Educational Film Exchanges, Inc.; 28Jul29; LP627.
A CONTENTED WOMAN. 1917. 2 reels. From the play by Charles
Hoyt.
Credits: Director, J. A. Richmond.
© Selig Polyscope Co.; 10Sep17; LP11401.
THE CONTENTS OF THE SUITCASE. 1913. 1 reel.
© Thomas A. Edison, Inc.; 15Sep13; LP1257.
THE CONTINENT OF SOUTH AMERICA. 1931. 962 ft.
© Eastman Teaching Films, Inc. (George W. Hoke, author);
17Jun31; MP2829.
A CONTINENTAL EVENING. 1930. 1 reel, sd.
Credits: Director, Jasper Ewing Brady.
© Columbia Pictures Corp.; 7Feb30; LP1057.
CONTRA LA CORRIENTE (AGAINST THE CURRENT). 1935. 11
reels.
Credits: Direction, text and continuity, Ramon Novarro.
© Ramon Novarro Samaniegos; 13Aug35; LP5711.
THE CONTRABAND. © 1913.
© Monarch Feature Film Co. (Deutsche Kinomatographen
Gesellschaft, author); title, descr. & 104 prints, 31Jul13; LU1044.
CONTRABAND. Paramount. Presented by Adolph Zukor and Jesse
L. Lasky. 1925. 6,773 ft. From the novel by Clarence Budington
Kelland.
Credits: Producer, Alan Crosland; screenplay, Jack Cunningham.
© Famous Players-Lasky Corp.; 10Feb25; LP21107.
CONTRACEPTIVE METHOD AND TECHNIQUE. 1935. 2 reels.
Credits: Producer and director, Marie Pichel Warner.
© Marie Pichel Warner; 18Oct35; MP6109.
CONTRARY MARY. SEE The Summer Girl.
CONTRARY MARY WITH BOBBY WATSON. 1930. 1 reel, sd.
© The Vitaphone Corp.; 19Mar30; MP1294.
CONTRASTS IN CHINA. (Vagabond Adventure Series) 1933. 10
min., sd.
Credits: Text, Russel Spaulding; narrator, Alois Havrilla.
© RKO Radio Pictures, Inc. (The Van Beuren Corp., author);
15May33; MP4057.
CONTROL YOURSELF. 1925. 2 reels.
Credits: Supervision, George E. Marshall; director, Robert P. Kerr;
story, Andrew Bennison.
© William Fox (Fox Film Corp., author); 15Nov25; LP22054.
CONVENTION CITY. 1933. 8 reels, sd.
Credits: Director, Archie Mayo; story, Peter Milne; screenplay,
Robert Lord.
© First National Pictures, Inc.; 26Dec33; LP4359.
CONVERGING PATHS. 1916. 2 reels.
Credits: Director, Burton L. King.
© Selig Polyscope Co. (Hattie Gray Baker, author); 23Sep16;
LP9189.
THE CONVERSION OF MR. ANTI. © 1913.
© Selig Polyscope Co. (Philip Lenoir, author); title, descr. & 32
prints, 1Nov13; LU1513.
THE CONVERSION OF SMILING TOM. 1915. 1 reel.
Credits: Producer, Tom Mix; story, Emma Bell.
© Selig Polyscope Co. (Emma Bell, author); 10Apr15; LP4985.
CONVERTING TIME INTO MONEY. 1931. Filmstrip.
© The Northwestern Mutual Life Insurance Co. (Nelson D.
Phelps & Russell P. Thierbach, authors); 11Nov31; MP3080.
CONVICT, COSTUMES, AND CONFUSION. 1914. 2 reels.
Credits: Director, Leo Beggs.
© The Vitagraph Co. of America (A. L. Stillman, author);
10Nov14; LP3738.
THE CONVICT KING. 1915. 3,000 ft.
Credits: Producer, Edward Sloman.
© Lubin Mfg. Co. (Dudley Glass, author); 22Dec15; LP7294.
CONVICT 993. Astra Film Corp. © 1918.
Credits: Director, William Parke; story, Wallace Clifton.
© Pathe Exchange, Inc. (Wallace C. Clifton, author); title, descr.
& 65 prints, 3Apr18; LU12256.
CONVICT NO. 113. © 1914.
** © Itala Film Co. of America; title, 25Jul14; descr., 27Feb14;
46 prints, 10Jul14; LU3092.
CONVICT 13. 1920. 2 reels.
Credits: Written and directed by Buster Keaton, Eddie Cline.
© Metro Pictures Corp.; 4Oct20; LP15633.
CONVICTED. 1938. 6 reels, sd.
Credits: Director, Leon Barsha; story, Cornell Woolrich;
screenplay, Edgar Edwards; film editor, William Austin.
© Columbia Pictures Corp. of California, Ltd.; 15Aug38; LP8202.
CONVICT'S CODE. 1939. 7 reels, sd.
Credits: Producer, E. B. Derr; director, Lambert Hillyer; original
screenplay, John W. Krafft.
© Monogram Pictures Corp.; 10Jan39; LP8549.
THE CONVICT'S SON. © 1914.
© Nordisk Films Co. (H. Lenthel, author); title, descr. & 55
prints, 20Feb14; LU2183.
THE CONVICT'S THREAT. 1915. 2,000 ft.
© Essanay Film Mfg. Co.; 17Sep15; LP6406.
CONVINCE 'EM FROM OVERTURE TO FINALE. 1930. 1 reel.
© Willys-Overland, Inc. (Raymond J. Faller, author); 15Apr30;
MP1501.
CONVOY. Presented by Robert Kane, in conjunction with Victor H.
and Edward R. Halperin. 1927. 8 reels. From the story "The Song
of the Dragon" by John Taintor Foote.
Credits: Director, Joseph C. Boyle; scenario, Willis Goldbeck.
© First National Pictures, Inc.; 11Apr27; LP23841.
COO COO NEWS. (Paramount Varieties) Presented by Adolph
Zukor. 1935. 1 reel, sd.
© Paramount Productions, Inc.; 24Jan35; MP5335.
COO-COO, THE MAGICIAN. (A Flip the Frog Cartoon) 1933. 1 reel,
sd.
© Metro-Goldwyn-Mayer Distributing Corp.; 6Mar33; MP3858.
COOCOONUT GROVE. (Merrie Melodies) 1936. 1 reel, sd., color.
Credits: Producer, Leon Schlesinger; supervision, I. Freleng;
animation, Bob McKimson, Sandy Walker; music director, Carl E.
Halling.
© The Vitaphone Corp.; 21Dec36; MP6989.
THE COOK. (Krazy Kat) © 1917.
© International Film Service, Inc.; title, descr. & 6 prints,
7Jun17; LU10899.
THE COOK. Released by Paramount. 1918. 2 reels.
Credits: Written and directed by Fatty Arbuckle.
© Comique Film Corp.; 20Aug18; LP12764.
THE COOK OF CANYON CAMP. 1917. 5 reels.
Credits: Story and direction, Donald Crisp; scenario, Donald
Crisp, Julia Crawford Ivers.
© Oliver Morosco Photoplay Co.; 30Jun17; LP11033.
COOK, PAPA, COOK. (Cameo Comedy) 1928. 1 reel.
Credits: Director, Wallace McDonald.
© Educational Film Exchanges, Inc.; 20Sep28; LP25626.
THE COOKIE CARNIVAL. (Silly Symphony) 1935. 1 reel, sd.
© Walt Disney Productions, Ltd.; 20May35; MP5646.
COOKING THE GOOSE. SEE The Runaway Bride.
COOKS AND CROOKS. 1918. 2 reels.
Credits: Director, James Davis.
© L-Ko Motion Picture Kompany; 7Mar18; LP12156.
THE COOK'S MISTAKE. 1915. 1 reel.
Credits: Director, W. F. Smith.
© Thomas A. Edison, Inc.; 1Apr15; LP4915.
COOKS VERSUS CHEFS. 1916. 1 reel.
© International Film Service, Inc. (Tom E. Powers, author);
21Jan16; MP508.
COOL HEADS. © 1938. B&w, 35 mm.
© E. I. du Pont de Nemours & Co. (Horace L. Roberts, author);
title, descr. & 3 prints, 27Sep38; MU8832.
COOL OFF! Educational Film Exchanges, Inc. 1926. 2 reels.
Credits: Director, William Watson; story, Sig Herzig.
© Christie Film Co., Inc.; 13Dec26; LP23427.
A COORIAL ON THE ORINOCO. 1918. 1 reel.
© C. L. Chester; 21Jul18; MP1229.
THE COP. 1928. Produced by Ralph Block for De Mille Pictures
Corp. 8 reels.
Credits: Producer and director, Donald Crisp; story, Elliott
Clawson; screenplay, Tay Garnett; film editor, Barbara Hunter.
© Pathe Exchange, Inc.; 11Jul28; LP25458.
THE COP AND THE ANTHEM. 1917. 2 reels. From the story by O.
Henry [pseud. of William Sydney Porter].
Credits: Director, Thomas R. Mills; adaptation, Edward J.
Montagne.
© Broadway Star Features Co., Inc.; 11May17; LP10748.
THE COP ON THE BEAT. © 1914.
© Selig Polyscope Co. (E. Lynn Summers, author); title, descr. &
43 prints, 13Mar14; LU2311.
COPENHAGEN. (A Fitzpatrick Traveltalk) 1937. 817 ft., sd., color.
Credits: Director, Ralph E. Donaldson; music score, Jack Shilkret.
© Metro-Goldwyn-Mayer Corp.; 5Nov37; MP7963.
COPLEY IN THE FAR EAST. © 1918.
© Eugene W. Copley; title & descr., 8Feb18; 24 prints, 4Mar18;
MU1164.
COPPER. Imp. 1915. 2 reels.
© Universal Film Mfg. Co., Inc.; 1Jul15; LP5715.
THE COPPER BEECHES. © 1912. From "The Adventures of
Sherlock Holmes" by Sir A. Conan Doyle.
© Société Française des Films & Cinématographes Éclair; title,
descr. & 41 prints, 4Nov12; LU88.
COPPER MINES AT BINGHAM, UTAH. 1912. 400 ft.
© Thomas A. Edison, Inc.; 10Oct12; MP5.
THE COPPERHEAD. 1919. 7 reels. From the play by Augustus
Thomas, founded on the novel "The Glory of His Country" by
Frederick Landis.
Credits: Direction and scenario, Charles Maigne.
© Famous Players-Lasky Corp.; 31Dec19; LP14633.
COPS. Presented by Joseph M. Schenck. 1922. 2 reels.
Credits: Written and directed by Buster Keaton and Eddie Cline.
© Comique Film Co., Inc.; 15Feb22; LP17630.
COPS AND CUSSEDNESS. 1917. 1 reel.
Credits: Director, Lawrence Semon; story, Lawrence Semon,
Graham Baker.
© The Vitagraph Co. of America; 5Feb17; LP10118.
COPS AND CUSSEDNESS. 1920. 1 reel.
Credits: Director, Graham Baker; story, Lawrence Semon,
Graham Baker.
© Vitagraph Co. of America; 26Jan20; LP14677.
COPS! AND ROBBERS! (Grantland Rice Sportlight) 1938. 1 reel, sd.
Credits: Narrator, Ted Husing.
© Paramount Pictures, Inc.; 25Mar38; MP8276.
THE COP'S BRIDE. 1929. 1 reel.
Credits: Paul Terry.
© Pathe Exchange, Inc.; 17Mar29; MP3.
COPS IS ALWAYS RIGHT. 1938. 1 reel, sd.
Credits: Director, Dave Fleischer; animation, Seymour Kneitel,
William Henning.
© Paramount Pictures, Inc.; 30Dec38; MP9019.
COPY. (Metro Movietone Act) 1929. 2 reels, sd., b&w.
Credits: Kendall Banning, Harold Kellock; director, Norman
Houston.
© Metro-Goldwyn-Mayer Distributing Corp.; 17Dec29; MP951.
COQUETTE. 1929. 9 reels. Based on the Jed Harris stage
production of the play by George Abbott and Ann Preston
Bridgers.
Credits: Adaptation, John Grey, Allen McNeil; dialogue, Sam
Taylor.
© The Pickford Corp. (John Grey, Allen McNeil & Sam Taylor,
authors); 30Mar29; LP560.
THE COQUETTE'S AWAKENING. 1915. 2 reels.
Credits: Director, Frank Beal.
© Selig Polyscope Co. (Will M. Hough, author); 27Nov15;
LP7099.
CORA. 1915. 5 reels.
© Metro Pictures Corp.; 10May15; LP6426.
CORA GREEN, THE FAMOUS CREOLE SINGER. 1929. 1 reel.
© The Vitaphone Corp.; 20Aug29; MP535.
CORAL. Bison. 1915. 4 reels.
Credits: Producer, Henry McRae; scenario, Olga P. Clark.
© Universal Film Mfg. Co., Inc.; 27Aug15; LP6221.
CORAL ISLE OF THE ATLANTIC. (World on Parade, no. 6) 1936. 1
reel.
Credits: Russell Spalding.
© The Van Beuren Corp.; 27May36; MP6418.
CORA'S SACRIFICE. © 1917.
© Nordisk Films Kompagni, A/S; title, descr. & 85 prints, 2Jan17;
LU9872.
CORDELIA THE MAGNIFICENT. 1923. 7 reels. Based on the novel
by Leroy Scott.
Credits: Director, George Archainbaud.
© Samuel Zieler Photoplay Corp.; 11Jun23; LP19379.
THE CO-RESPONDENT. Advanced Motion Pictures. 1917. 6 reels.
Based on the stage play by Alice Leal Pollock and Rita Weiman.
Credits: Director, Ralph W. Ince.
© Jewel Productions, Inc.; 11Oct17; LP11550.
CORINNE, COME HERE. © 1919.
Credits: Producer, Charles E. Bartlett.
© Pathe Exchange, Inc. (Chas. E. Bartlett, author); title, descr. &
30 prints, 10Jan19; LU13248.
A CORN-FED SLEUTH. Century. 1923. 2 reels.
Credits: Written and directed by Al Herman.
© Universal Pictures Corp.; 26Oct23; LP19547.
CORN GROWING. 1928. 1 reel.
© Eastman Kodak Co. (George W. Hoke, author); 7Mar28;
MP4929.
CORN ON THE COP. 1934. 2 reels, sd.
Credits: Director, Ralph Staub; story, Jack Henley, Dolph Singer.
© The Vitaphone Corp.; 23Apr34; LP4634.
CORNELL. (The Spirit of the Campus) Presented by E. W.
Hammons. 1932. 1 reel, sd.
Credits: Director, Aubrey Scotto; story, Millard Gibson, Gar O'Neil.
© Larry Kent Productions, Inc.; 18Dec32; MP4026.
THE CORNER. © 1915.
© Triangle Film Corp. (C. Gardner Sullivan, author); title, descr.
& 402 prints, 15Dec15; LU7207.
THE CORNER. 1916. 5 reels.
© Triangle Film Corp. (C. Gardner Sullivan, author); 9Jan16;
LP10835.
THE CORNER GROCER. Presented by William A. Brady. © 1917.
Credits: Director, George Cowl; story, Adolph Phillips; scenario,
Lawrence McCloskey.
© World Film Corp. (Lawrence McCloskey, author); title & descr.,
17Sep17; 240 prints, 24Sep17; LU11455.
A CORNER IN COTTON. Quality Pictures Corp. 1916. 5 reels.
Credits: Director, Fred J. Balshofer.
© Metro Pictures Corp.; 19Feb16; LP7676.
A CORNER IN SMITH'S. Black Cat. 1917. 29 min.
Credits: Director, Henry Beaumont; story, Edward T. Lowe, Jr.
© Essanay Film Mfg. Co.; 3Jul17; LP11054.
A CORNER IN WATER. 1916. 1 reel.
Credits: Produced and written by Tom Mix.
© Selig Polyscope Co. (Tom Mix, author); 2Sep16; LP9078.
THE CORNER POCKET. © 1921.
© Pathe Exchange, Inc. (Hal E. Roach, author); title, descr. & 20
prints, 10Dec21; LU17338.
THE CORNER STORE. SEE Fred Ardath in The Corner Store.
CORNERED. 1924. 8 reels. Based on the play by Dodson Mitchell
and Zelda Sears.
Credits: Director, William Beaudine; adaptation, Hope Loring,
Louis Duryea Lighton.
© Warner Bros. Pictures, Inc.; 9Aug24; LP20480.
CORNERED. 1932. 6 reels, sd.
Credits: Director, Reeves Eason; story, William Colt MacDonald;
screenplay, Ruth Todd; film editor, Otto Meyer.
© Columbia Pictures Corp.; 10Aug32; LP3192.
CORNERED. SEE Road to Paradise.
THE CORNET. 1915. 1,000 ft.
© Lubin Mfg. Co. (George W. Terwilliger, author); 3Jun15;
LP5469.
CORNFLOWER CASSIE'S CONCERT. SEE Beauty and the Bad Man.
CORNWALL, THE ENGLISH RIVIERA. (British Beauty Spots) 1913.
1 reel.
© Thomas A. Edison, Inc.; 5Sep13; MP82.
CORONADO. Presented by Adolph Zukor. 1935. 8 reels, sd.
Credits: Producer, William Le Baron; director, Norman McLeod;
story, Brian Hooker, Don Hartman; screenplay, Don Hartman,
Frank Butler; editor, Hugh Bennett; music and lyrics, Richard A.
Whiting.
© Paramount Productions, Inc.; 29Nov35; LP5954.
CORONATION OF POPE PIUS XII. 1939. 1 reel.
© Castle Films, Inc. (Eugene Castle, author); 20Mar39; MP9265.
THE CORONATION OF THE SHAH OF PERSIA. 1914. 660 ft.
** © Gaumout Co.; 8Oct14; LP3571.
THE CORONATION OF THEIR MAJESTIES KING GEORGE VI AND
QUEEN ELIZABETH. 1937. 1 reel.
Credits: Editor, Eugene W. Castle.
© Pathegrams, Inc. (Eugene W. Castle, author); 20May37;
MP7425.
CORPORAL BILLY'S COMEBACK. Big U. 1916. 2 reels.
Credits: Producer, George Cochrane; story, Harry Leon Wilson;
scenario, Calder Johnstone.
© Universal Film Co., Inc.; 17May16; LP8307.
CORPORAL CAMERON. SEE Cameron of the Royal Mounted.
CORPORAL JIM'S WARD. © 1921.
© Irving Cummings Production Co. (R. I. Sinbern, author); title,
descr. & 41 prints, 2Jul21; LU16721.
CORPORAL KATE. De Mille Pictures Corp. Released by Producers
Distributing Corp. 1926. 8 reels.
Credits: Supervision, C. Gardiner Sullivan; director, Paul Sloane;
story, Zelda Sears, Marion Orth; scenario, Albert Shelby LeVino.
© Cinema Corp. of America; 29Nov26; LP23383.
THE CORPORAL'S DAUGHTER. 1915. 1,000 ft.
Credits: Jack Crawford; director, Langdon West.
© Thomas A. Edison, Inc.; 5Jun15; LP5492.
THE CORPSE. SEE Atonement.
CORRECT ORDERING. © 1935.
© Standard Brands, Inc. (Harry G. Kebel, Standard Brands, Inc.,
employer for hire, author); title, descr. & 65 prints, 4Jun35;
MU5626.
CORRECT POSITION AND MOVEMENT FOR WRITING. © 1924.
© Arthur G. Skeeles; title, descr. & 27 prints, 11Nov24; MU2775.
CORRECT SHORTHAND TECHNIQUE. School, Business
Administration of the State College of Washington. 1934. 500 ft.,
16 mm.
Credits: Director, Eleanor Skimin.
© Gordon F. Cadisch (Eleanor Skimin and Ethel Wood, authors);
1Oct34; MP5069.
CORRECT TECHNIQUE IN ORAL HYGIENE. © 1927.
© Bertram B. Machat; title, descr. & 16 prints, 11Apr27;
MU3933.
THE CORRUPTED FLOWER. © 1913.
© Pasquali American Co. (Ernesto Pasquali, author); title, descr.
& 222 prints, 4Sep13; LU1200.
THE CORSAIR. © 1914.
© Eclectic Film Co. (G. Fitzmaurice, author); title & descr.,
24Oct14; 144 prints, 19Oct14; LU3584.
CORSAIR. United Artists. 1931. 8 reels. From a novel by Walton
Green.
Credits: Producer, Roland West; adaptation, Josephine Lovett.
© Art Cinema Corp. (Walton Green, author); 28Oct31; LP2668.
THE CORSAIR'S SON. SEE Le Fils du Filibustier.
THE CORSICAN BROTHERS. Imp. 1915. 3 reels. Adapted from the
novel by Alexander Dumas.
Credits: Producer, George A. Lessey.
© Universal Film Mfg. Co., Inc.; 8May15; LP5238.
COSCIA AND VERDI IN MUSIC-GLORIFIED, CLASSIFIED, AND
MORTIFIED. 1928. 1 reel.
© Vitaphone Corp.; 15Mar28; MP4830.
COSETTE. SEE The Rise of Susan.
COSMIC RAY. © 1932.
© Neil E. Gordon (Robert A. Millikan, author); title & descr.,
10Jun32; 4 prints, 18Jun32; MU3378.
THE COSSACK WHIP. 1916. 5 reels, tinted.
Credits: James Oppenheim; director, John H. Collins.
© Thomas A. Edison, Inc.; 19Sep16; LP9158.
THE COSSACKS. 1928. 10 reels, b&w. From the novel by Lyof N.
Tolstoi.
Credits: Producer and director, George Hill; adaptation and
continuity, Frances Marion; film editor, Blanche Sewell.
© Metro-Goldwyn-Mayer Distributing Corp.; 23Jun28; LP25438.
THE COST. Paramount-Artcraft. Presented by Adolph Zukor. 1920.
6 reels.
Credits: Director, Harley Knoles; story, David Graham Phillips;
scenario, Ctara S. Beranger.
© Famous Players-Lasky Corp.; 28Feb20; LP14812.
THE COST OF HATRED. 1917. 5 reels.
Credits: Producer, George H. Melford; scenario, Beulah Marie Dix.
© Jesse L. Lasky Feature Play Co.; 2Apr17; LP10490.
THE COST OF HIGH LIVING. 1916. 1 reel.
Credits: Director, William Wolbert.
© The Vitagraph Co. of America (Jos. F. Poland, author);
9May16; LP8267.
THE COST OF LIVING. SEE Money Means Nothing.
COSTA RICA. (Paramount Color Cruises) Presented by Adolph
Zukor. 1938. 1 reel, sd., color.
Credits: Produced and photographed by Palmer Miller, Curtis F.
Nagel; narrator, Gene Hamilton.
© Paramount Pictures, Inc.; 2Dec38; MP8947.
THE COSTELLO CASE. 1930. 7 reels, sd.
Credits: Producers, James Cruze, Sam Zierler; supervision,
James Cruze; director, Walter Lang; story, F. McGrew Willis.
© Sono Art World Wide Pictures, Inc.; 7Nov30; LP1711.
A COSTUME PIECE. 1914. 1 reel.
© Vitagraph Co. of America. (George H. Plympton, author);
29Sep14; LP3453.
COSTUMES OF THE WORLD. (World Adventures, no. 11) 1933. 1
reel.
Credits: E. M. Newman; editor, Bert Frank.
© Warner Bros. Pictures, Inc.; 24Jul33; MP4172.
COTTON—FROM SEED TO CLOTH. (Harvard Series on Commerce
and Industry) 1931. Prepared in cooperation with Nashua Mfg.
Co. and produced in collaboration with Harvard University, Dept.
of Geology and Geography. 2 reels.
Credits: Kirtley F. Mather.
© Films of Commerce, Inc.; 1Sep31; MP2786.
COTTON GOODS. 1930. 1 reel.
© Eastman Teaching Films, Inc. (George W. Hoke, author);
19Feb30; MP1823.
COTTON GROWING. 1928. 1 reel.
© Eastman Kodak Co. (George W. Hoke, author); 15Mar28;
MP4926.
THE COTTON KING. © 1915. Based upon the stage play by Sutton
Vane.
© World Film Corp. (Oscar Eagle, author); title & descr.,
31Aug15; 150 prints, 1Sep15; LU6277.
COTTON MANUFACTURE. © 1917.
© Lincoln & Parker Company, Inc.; title, descr. & 13 prints,
18Oct17; MU1059.
COTTON, THE FABRIC OF FASHION. Presented by Aberfoyle Mfg.
Co. 1929. Filmstrip, 68 frames.
© Rowland Rogers Picture Service, Inc. (Rowland Rogers,
author); 23Oct29; MP1526.
COTTON, THE HOUSEHOLD FABRIC. Presented by Cannon Mills,
Inc. 1930. Filmstrip, 80 frames (11 in color)
© Rowland Rogers Picture Service, Inc. (Rowland Rogers,
author); 27Feb30; MP1536.
COTTONWOOD GULCH. SEE North of the Rio Grande.
THE COUGAR; or, MOUNTAIN LION. © 1921.
© Pathe Exchange, Inc. (Robert North Bradbury, author); title,
descr. & 20 prints, 19Jul21; LU16777.
THE COUGAR'S MISTAKE. (Camera Adventures) Educational
Pictures. 1933. 9 min.
Credits: Producer, Harold Austin; narrator, Felix Adler.
© Pat Dowling; 28May33; LP3985.
COUGHING HIGGINS. © 1917.
© John Ray; title & descr., 11Jun17; 100 prints, 25Jun17;
LU10989.
COUNSEL FOR CRIME. 1937. 7 reels, sd.
Credits: Director, John Brahm; story, Harold Shumate;
screenplay, Fred Niblo, Jr., Grace Neville; Lee Loeb, Harold
Buchman; film editor, Otto Meyer; music director, Morris Stoloff.
© Columbia Pictures Corp. of California, Ltd.; 4Sep37; LP7388.
COUNSEL FOR THE DEFENSE. © 1915.
© Pathé Frères (Balboa Feature Film Co., author); title, descr. &
90 prints, 6Oct15; LU6568.
COUNSEL FOR THE DEFENSE. © 1925. From the novel by Leroy
Scott.
Credits: Supervision, Edward S. Silton; director, Burton King.
© Associated Exhibitors, Inc. (Arthur Hoerl, author); title, descr.
& 90 prints, 6Nov25; LU21981.
COUNSEL ON DE FENCE. 1934. 2 reels, sd.
Credits: Director, Arthur Ripley; story and screenplay, Harry
McCoy.
© Columbia Pictures Corp.; 29Oct34; LP5070.
COUNSELITIS. 1935. 2 reels, sd.
Credits: Producer, Lee Marcus; story, and direction, Al Boasberg;
film editor, Tholen Gladden.
© RKO Radio Pictures, Inc.; 22Nov35; LP5981.
COUNSELLOR AT LAW. 1933. 9 reels. From the play by Elmer Rice.
Credits: Director, William Wyler; screenplay, Elmer Rice.
© Universal Pictures Corp.; 5Dec33; LP4314.
THE COUNT. 1916. 2 reels.
Credits: Producer, Charles Chaplin.
© Lone Star Corp. (Lone Star Film Corp., author); 4Sep16;
LP9188.
THE COUNT AND THE WEDDING GUEST. 1918. 2 reels. From the
story by O. Henry [pseud. of William Sydney Porter].
Credits: Director, Martin Justice; adaptation, Katharine Reed.
© Broadway Star Features Co., Inc.; 5Jan18; LP11905.
COUNT—EM. 1915. 1 reel.
Credits: Director, Ralph Ince.
© The Vitagraph Co. of America (Ralph Ince, author); 8Nov15;
LP6875.
COUNT MACARONI. 1915. 1,000 ft.
Credits: Allan Davis; director, Will Louis.
© Thomas A. Edison, Inc.; 14Apr15; LP5035.
COUNT ME OUT. (Cameo Comedy) 1928. 1 reel.
Credits: Director, Zion Myers.
© Educational Film Exchanges, Inc.; 28Feb28; LP25009.
COUNT ME OUT. (Merrie Melodies) 1938. 7 min., sd., color.
Credits: Producer, Leon Schlesinger; supervision, Ben Hardaway,
Cal Dalton; story, Melvin Millar; animation, Herman Cohen; music
director, Carl W. Stalling.
© The Vitaphone Corp.; 21Dec38; MP9145.
THE COUNT OF LUXEMBOURG. 1925. 7 reels. Adapted from the
operetta of Franz Lehár, with libretto by A. M. Willner and Robert
Bodanzky.
Credits: Supervision, Hampton Del Ruth; director, Arthur Gregor;
adaptation, John F. Natteford, Arthur Gregor.
© Chadwick Pictures Corp.; 14Dec25; LP22116.
COUNT OF MONTE CRISTO. 1912. 5 reels.
© Famous Players Film Co. (Edwin S. Porter & Joseph Golden,
authors); 10Dec12; LP188.
THE COUNT OF MONTE CRISTO. Released through United Artists.
1934. 13 reels, sd. Based on the novel by Alexandre Dumas.
Credits: Supervision, Edward Small; director, Rowland V. Lee;
screenplay and dialogue, Philip Dunne, Dan Totheroh, Rowland V.
Lee; film editor, Grant Whytock; music director, Alfred Newman.
© Reliance Pictures, Inc.; 19Dec34; LP5188.
THE COUNT OF MONTE CRISTO. SEE Monte Cristo.
THE COUNT OF TEN. Universal Jewel. 1927. 7 reels.
Credits: Director, James Flood; original story, Gerald Beaumont;
continuity, Harry Hoyt.
© Universal Pictures Corp.; 20Oct27; LP24557.
THE COUNT TAKES THE COUNT. (Hal Roach Comedy) (Charley
Chase Comedy) 1936. 2 reels, sd., b&w.
Credits: Directors, Charles Parrott, Harold Law; film editor,
William Ziegler.
© Metro-Goldwyn-Mayer Corp.; 7Jan36; LP6054.
COUNT THE VOTES. Rolin Film Co. © 1919.
© Pathe Exchange, Inc. (Rolin Film Co., author); title, descr. &
20 prints, 23Aug19; LP14104.
COUNT TWENTY. 1915. 2 reels.
© Biograph Co.; 23Nov15; LP7047.
COUNT YOUR CHANGE. Rolin Film Co. © 1919.
© Pathe Exchange, Inc. (Rolin Film Co., author); title, descr. &
20 prints, 15Jul19; LU13950.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!
ebookultra.com

More Related Content

PDF
Cyber Security for next generation Computing Technologies 1st Edition Inam Ul...
PDF
Cyber Security For Nextgeneration Computing Technologies Inam Ullah Khan Mari...
PDF
Blockchain For Information Security And Privacy 1st Edition
PDF
Iot Security And Privacy Paradigm Internet Of Everything Ioe 1st Edition Souv...
PDF
Multimedia Watermarking Techniques And Applications 1st Edition Darko Kirovski
PDF
Digital Forensics In The Era Of Artificial Intelligence Nour Moustafa
PDF
Blockchain Technology For Ioe Security And Privacy Perspectives 1st Edition A...
PDF
Internet Of Everything And Big Data Major Challenges In Smart Cities Salahddi...
Cyber Security for next generation Computing Technologies 1st Edition Inam Ul...
Cyber Security For Nextgeneration Computing Technologies Inam Ullah Khan Mari...
Blockchain For Information Security And Privacy 1st Edition
Iot Security And Privacy Paradigm Internet Of Everything Ioe 1st Edition Souv...
Multimedia Watermarking Techniques And Applications 1st Edition Darko Kirovski
Digital Forensics In The Era Of Artificial Intelligence Nour Moustafa
Blockchain Technology For Ioe Security And Privacy Perspectives 1st Edition A...
Internet Of Everything And Big Data Major Challenges In Smart Cities Salahddi...

Similar to Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan (20)

PDF
Future Connected Technologies Growing Convergence And Security Implications M...
PDF
Botnets Architectures Countermeasures And Challenges First Edition Anagnostop...
PDF
Digital Image Security Techniques And Applications Edited By Amit Kumar Singh...
PDF
Industrial communication technology handbook Second Edition Richard Zurawski
PDF
5G Wireless Communication System in Healthcare Informatics 1st Edition Manoj ...
PDF
Contextaware Pervasive Systems 1st Edition Seng Loke
PDF
Fixed Mobile Convergence Handbook Syed A Ahson Mohammad Ilyas
PDF
Intelligent Data Analytics Iot And Blockchain Bashir Alam Mansaf Alam
PDF
Information Security Handbook (Internet of Everything (IoE)) 1st Edition Vari...
PDF
Ai Factory Theories Applications And Case Studies Ramin Karim
PDF
Security Engineering For Embedded And Cyberphysical Systems Saad Motahhir
PDF
WiMAX Applications 1st Edition Syed A. Ahson
PDF
Handbook Of Smart Manufacturing Dr Ajay Kumar
PDF
WiMAX Applications 1st Edition Syed A. Ahson 2024 Scribd Download
PDF
WiMAX Applications 1st Edition Syed A. Ahson
PDF
Cloud Computing and Software Services Theory and Techniques 1st Edition Syed ...
PDF
Explainable Artificial Intelligence For Intelligent Transportation Systems Am...
PDF
Computing and Communications Engineering in Real-Time Application Development...
PDF
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
PDF
Value Added Services for Next Generation Networks Informa Telecoms Media 1st ...
Future Connected Technologies Growing Convergence And Security Implications M...
Botnets Architectures Countermeasures And Challenges First Edition Anagnostop...
Digital Image Security Techniques And Applications Edited By Amit Kumar Singh...
Industrial communication technology handbook Second Edition Richard Zurawski
5G Wireless Communication System in Healthcare Informatics 1st Edition Manoj ...
Contextaware Pervasive Systems 1st Edition Seng Loke
Fixed Mobile Convergence Handbook Syed A Ahson Mohammad Ilyas
Intelligent Data Analytics Iot And Blockchain Bashir Alam Mansaf Alam
Information Security Handbook (Internet of Everything (IoE)) 1st Edition Vari...
Ai Factory Theories Applications And Case Studies Ramin Karim
Security Engineering For Embedded And Cyberphysical Systems Saad Motahhir
WiMAX Applications 1st Edition Syed A. Ahson
Handbook Of Smart Manufacturing Dr Ajay Kumar
WiMAX Applications 1st Edition Syed A. Ahson 2024 Scribd Download
WiMAX Applications 1st Edition Syed A. Ahson
Cloud Computing and Software Services Theory and Techniques 1st Edition Syed ...
Explainable Artificial Intelligence For Intelligent Transportation Systems Am...
Computing and Communications Engineering in Real-Time Application Development...
Cybersecurity for Industrial Control Systems SCADA DCS PLC HMI and SIS 1st Ed...
Value Added Services for Next Generation Networks Informa Telecoms Media 1st ...
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
Final Presentation General Medicine 03-08-2024.pptx
Basic Mud Logging Guide for educational purpose
GDM (1) (1).pptx small presentation for students
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra
Supply Chain Operations Speaking Notes -ICLT Program
Module 4: Burden of Disease Tutorial Slides S2 2025
O5-L3 Freight Transport Ops (International) V1.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
01-Introduction-to-Information-Management.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Sports Quiz easy sports quiz sports quiz
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPH.pptx obstetrics and gynecology in nursing
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Anesthesia in Laparoscopic Surgery in India
Microbial diseases, their pathogenesis and prophylaxis
102 student loan defaulters named and shamed – Is someone you know on the list?
Ad

Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan

  • 1. Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan download pdf https://ebookultra.com/download/cyber-security-for-next-generation- computing-technologies-1st-edition-inam-ullah-khan/ Visit ebookultra.com today to download the complete set of ebook or textbook!
  • 2. We have selected some products that you may be interested in Click the link to download now or visit ebookultra.com for more options!. Check Point Next Generation Security Administration 1st Edition Syngress https://ebookultra.com/download/check-point-next-generation-security- administration-1st-edition-syngress/ Next Generation IPTV Services and Technologies 1st Edition Gerard O'Driscoll https://ebookultra.com/download/next-generation-iptv-services-and- technologies-1st-edition-gerard-odriscoll/ E Infrastructures and Technologies for Lifelong Learning Next Generation Environments 1st Edition George Magoulas https://ebookultra.com/download/e-infrastructures-and-technologies- for-lifelong-learning-next-generation-environments-1st-edition-george- magoulas/ Security Management of Next Generation Telecommunications Networks and Services 1st Edition Stuart Jacobs(Auth.) https://ebookultra.com/download/security-management-of-next- generation-telecommunications-networks-and-services-1st-edition- stuart-jacobsauth/
  • 3. Next Generation SOA A Real World Guide to Modern Service Oriented Computing 1st Edition Thomas Erl https://ebookultra.com/download/next-generation-soa-a-real-world- guide-to-modern-service-oriented-computing-1st-edition-thomas-erl/ Digital Security Cyber Terror and Cyber Security The Digital World 1st Edition Ananda Mitra https://ebookultra.com/download/digital-security-cyber-terror-and- cyber-security-the-digital-world-1st-edition-ananda-mitra/ Cyber Security and Network Security 1st Edition Sabyasachi Pramanik https://ebookultra.com/download/cyber-security-and-network- security-1st-edition-sabyasachi-pramanik/ Computational Methods for Next Generation Sequencing Data Analysis 1st Edition Ion Mandoiu https://ebookultra.com/download/computational-methods-for-next- generation-sequencing-data-analysis-1st-edition-ion-mandoiu/ Cyber Security 1st Edition Jocelyn O. Padallan https://ebookultra.com/download/cyber-security-1st-edition-jocelyn-o- padallan/
  • 5. Cyber Security for next generation Computing Technologies 1st Edition Inam Ullah Khan Digital Instant Download Author(s): InamUllah Khan, Abou el Houba,Maria Ouaissa ISBN(s): 9781003404361, 1003404367 Edition: 1 File Details: PDF, 8.96 MB Year: 2024 Language: english
  • 7. Cyber Security for Next-Generation Computing Technologies This book sheds light on the cyber security challenges associated with next- generation computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. KEY FEATURES • Highlights innovative principles and practices using next generation computing technologies based cybersecurity. • Presents an introduction to recent trends regarding the convergence of AI/ML in cybersecurity • Offers an overview of theoretical, practical, simulation concepts of cybersecurity
  • 9. Cyber Security for Next-Generation Computing Technologies Edited by Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda, and Muhammad Fazal Ijaz Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business
  • 10. Designed cover image: Shutterstock First edition published 2024 by CRC Press 2385 NW Executive Center Drive, Suite 320, Boca Raton FL 33431 and by CRC Press 4 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN CRC Press is an imprint of Taylor & Francis Group, LLC © 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, access www. copyright.com or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978–750–8400. For works that are not available on CCC please contact mpkbookspermissions@tandf.co.uk Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe. ISBN: 978-1-032-51899-2 (hbk) ISBN: 978-1-032-51900-5 (pbk) ISBN: 978-1-003-40436-1 (ebk) DOI: 10.1201/9781003404361 Typeset in Times by Apex CoVantage, LLC
  • 11. v Contents Preface......................................................................................................................vii About the Editors......................................................................................................ix List of Contributors................................................................................................ xiii Chapter 1 Cyber Security: Future Trends and Solutions ......................................1 Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar Chapter 2 Security and Intelligent Management: Survey................................... 16 Zaigham Abbas, Abdul Qahar Shahzad, Muhammad Yaseen Ayub, and Muhammad Allah Rakha Chapter 3 Comparative Analysis of Machine and Deep Learning for Cyber Security..............................................................................39 Hafsa Maryam, Syeda Zillay Nain Zukhraf, and Rehmat Ullah Chapter 4 AI-Based Secure Wireless Communication Technologies and Cyber Threats for IoT Networks ........................................................70 Usman Haider, Bakhtawar Nawaal, Inam Ullah Khan, and Salma El Hajjami Chapter 5 Cyber Threat Actors Review: Examining the Tactics and Motivations of Adversaries in the Cyber Landscape ..................84 Zakaria Abou El Houda Chapter 6 Layer-Based Security Threats in IoT Networks...............................102 Muna Muhammad, Ahthasham Sajid, and Hira Arshad Chapter 7 Intrusion Detection System Using AI and Machine Learning Algorithm..........................................................120 Muhammad Tehmasib Ali Tashfeen Chapter 8 Signature-Based Intrusion Detection System for IoT....................... 141 Bakhtawar Nawaal, Usman Haider, Inam Ullah Khan, and Muhammad Fayaz
  • 12. vi Contents Chapter 9 Hybrid Model for IoT-Enabled Intelligent Towns Using the MQTT-IoT-IDS2020 Dataset............................................................ 159 Zupash, Muhammad Allah Rakha, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, and Muhammad Yaseen Ayub Chapter 10 Cyber Security for Edge/Fog Computing Applications................... 177 Hanane Lamaazi Chapter 11 Cyber Attacks Against Intelligent Transportation Systems.............190 Muhammad Usama, Ubaid Ullah, and Ahthasham Sajid Chapter 12 Intelligent Transportation Systems for IoT-Based UAV Networks.................................................................................. 231 Mamoona Jamil, Usman Haider, Inam Ullah Khan, and Tarandeep Kaur Bhatia Chapter 13 Cyber Attack Detection Analysis Using Machine Learning for IoT-Based UAV Network ............................................................253 Usman Haider, Hina Shoukat, Muhammad Yaseen Ayub, Muhammad Tehmasib Ali Tashfeen, Tarandeep Kaur Bhatia, and Inam Ullah Khan Chapter 14 Blockchain Solutions for Cyber Criminals ......................................265 Vijendra Kumar Maurya, Denis Jangeed, Latif Khan, and Bhupendra Kumar Soni Chapter 15 Blockchain Security Measures to Combat Cyber Crime ................. 275 Rahmeh Ibrahim and Qasem Abu Al-Haija Chapter 16 AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective .................294 Fahad Naveed, Shahbaz Ali Imran, Aftab Alam Janisar, Aliyu Yusuf, Salman Khan, and Inam Ullah Khan
  • 13. vii Preface The field of cyber security has recently gained significant importance as the chal- lenge of securing information transmission becomes crucial. The advent of smart IT infrastructure has revolutionized the global landscape, but it has also brought forth security concerns. Consequently, cyber crimes have witnessed a steady rise over time, involving activities such as identity theft, bullying, terrorism, and network disruptions. In this smart world, privacy and security have become indispensable for individuals. Fortunately, the next generation of computing technologies, including IoT/IoE, artificial intelligence, machine learning, deep learning, smart grid, ad hoc networks, SDN, network security, big data, image processing, and green communi- cation, offers potential solutions. The integration of these fields encompasses cyber attacks, forensic analysis, and privacy issues, necessitating exploration through optimization techniques and evolu- tionary computations. Next-generation computing finds diverse applications in areas like smart infrastructure, air quality monitoring, waste management, school man- agement, healthcare, and telemedicine. These applications rely on security measures to facilitate optimal decision making in real time. Ad hoc networks play a crucial role in reducing end-to-end delays and connectivity problems, while wireless com- munication technology serves as the backbone of future networks. Governments, enterprises, and individuals must prioritize cyber security and utilize forensic tech- niques to protect data when sharing it with others, as privacy concerns arise due to potential security breaches during extensive data sharing. Analyzing complex information and real-time data is essential for ensuring the sustainability of future networks and related applications. This book sheds light on the cyber security challenges associated with next- generation computing technologies, emphasizing the serious threats posed to individ- uals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart technologies. This book covers key topics related to cyber security in next-generation computing technologies, ultimately enhancing the quality of life for citizens, facilitating interaction with smart governments, and promoting secure communication processes. Chapter 1 provides an overview of cyber security, exploring its impact on busi- nesses and analyzing recent trends and future solutions. Chapter 2 focuses on security and intelligent management to ensure system safety. Chapter 3 presents a comprehensive study of machine learning (ML) and deep learning (DL) techniques for detecting potential cyber attacks, while Chapter 4 surveys AI-based applications, intrusion detection systems (IDS), cyber attacks on IoT networks, and AI tools.
  • 14. viii Preface Chapter 5 aims to investigate the tactics and motivations of cyber threat actors in the current cyber security landscape, while Chapter 6 conducts a detailed review of security threats and attacks across different layers of IoT systems. Chapter 7 demon- strates how an intrusion detection system using AI and ML can function effectively out of the box, and Chapter 8 provides a detailed survey on signature-based IDS for IoT environments. In Chapter 9, a hybrid model is proposed for identifying attacks on IoT-enabled smart cities. Chapter 10 offers an overview of cyber security in edge/fog computing applica- tions, highlighting potential risks, common attack vectors, and best practices for security. Chapter 11 explores various cyber security attacks targeting intelligent transportation systems (ITS), including phishing attacks, malware, remote access, denial of service (DoS) attacks, physical attacks, insider threats, and social engi- neering. Chapter 12 presents a comprehensive survey of security attacks in UAV networks and other intelligent transportation systems, while Chapter 13 conducts a comparative study of machine learning techniques to investigate trust in IoT-based aerial ad hoc networks. Chapter 14 delves into the applications of blockchain technology in cyber security and the security solutions it offers, while Chapter 15 expands on blockchain con- cepts, components, architecture, features, types, and limitations. Lastly, Chapter 16 focuses on human activity recognition problems from a cyber security perspective, proposing a novel method for accurate human activity recognition through different algorithms.
  • 15. ix About the Editors Dr. Inam Ullah Khan is a visiting researcher at King’s College London, UK. Dr. Khan was a lecturer at different universities in Pakistan, including the Center for Emerging SciencesEngineering&Technology(CESET),Islamabad,AbdulWaliKhanUniversity, Garden and Timergara Campus, and University of Swat. He did his PhD in Electronics Engineering from the Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He completed his MS degree in Electronic Engineering at the Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He obtained his undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan. In addition, his master’s thesis was published as a book, Route Optimization with Ant Colony Optimization (ACO) (Lambert Academic Publishing, 2017), in Germany, which is available on Amazon. He is a research scholar and has published research papers at the international level. More interestingly, he recently introduced a novel on routing protocol E-ANTHOCNET in the area of flying ad hoc networks. His research interests include network system security, intrusion detec- tion, intrusion prevention, cryptography, optimization techniques, WSN, IoT, UAVs, mobile ad hoc networks (MANETS), flying ad hoc networks, and machine learning. He has served at international conferences as a technical program committee mem- ber, which include the EAI International Conference on Future Intelligent Vehicular Technologies, Islamabad, Pakistan, and the 2nd International Conference on Future Networks and Distributed Systems, Amman, Jordan, June 26–27, 2018, and has been recently working on the same level at the International Workshop on Computational Intelligence and Cybersecurity in Emergent Networks (CICEN’21) that will be held in conjunction with the 12th International Conference on Ambient Systems, Networks and Technologies (EUSPN 2021), which was co-organized in November 1–4, 2021, in Leuven, Belgium. He has published more than 20 research papers (including book chapters, peer-reviewed journal articles, and peer-reviewed conference manuscripts) and three edited books. Dr. Mariya Ouaissa is currently a Professor in Cybersecurity and Networks at Cadi Ayyad University and a practitioner with industry and academic experience. She obtained a PhD in 2019 in Computer Science and Networks, at the Laboratory of Modelisation of Mathematics and Computer Science from ENSAM-Moulay Ismail University, Meknes, Morocco. She is a Networks and Telecoms Engineer, hav- ing graduated in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a co-founder and IT consultant at the IT Support and Consulting Center. She worked for the School of Technology of Meknes Morocco as Visiting Professor from 2013 to 2021. She is a member of the International Association of Engineers and International Association of Online Engineering, and since 2021, she is an ACM Professional Member. She is Expert Reviewer with the Academic Exchange Information Centre (AEIC) and Brand Ambassador with Bentham Science. She has served and continues to serve on technical program and organizer committees of
  • 16. x About the Editors several conferences and events and has organized many symposiums/workshops/ conferences as a general chair and as a reviewer of numerous international jour- nals. Dr. Ouaissa has made contributions in the fields of information security and privacy, Internet of Things security, and wireless and constrained networks secu- rity. Her main research topics are IoT, M2M, D2D, WSN, cellular networks, and vehicular networks. She has published over 40 papers (book chapters, international journals, and conferences/workshops), ten edited books, and eight special issues as guest editor. Dr. Mariyam Ouaissa is currently Assistant Professor of Networks and Systems at Chouaib Doukkali University. She received her PhD degree in 2019 from the National Graduate School of Arts and Crafts, Meknes, Morocco, and her Engineering Degree in 2013 from the National School of Applied Sciences, Khouribga, Morocco. She is a communication and networking researcher and practitioner with industry and academic experience. Dr. Ouaissa’s research is multidisciplinary and focused on the Internet of Things, M2M, WSN, vehicular communications and cellular networks, security networks, congestion overload problems, and resource allocation manage- ment and access control. She is serving as a reviewer for international journals and conferences, including IEEE access, wireless communications, and mobile com- puting. Since 2020, she is a member of the International Association of Engineers IAENG and International Association of Online Engineering, and since 2021, she is an ACM Professional Member. She has published more than 30 research papers (this includes book chapters, peer-reviewed journal articles, and peer-reviewed con- ference manuscripts), ten edited books, and six special issue as guest editor. She has served on program committees and organizing committees of several conferences and events and has organized many symposiums/workshops/conferences as a gen- eral chair. Dr. Zakaria Abou El Houda is a researcher at the Université de Montréal, Montréal, Canada. He received an MSc degree in Computer Networks from Paul Sabatier University, Toulouse, France, his PhD degree in Computer Science from the University of Montréal, Canada, and PhD degree in Computer Engineering from the University of Technology of Troyes, Troyes, France. He has made contributions in the fields of information security, intrusion detection/prevention system, and security in software-defined networks. His current research interests include ML/DL-based intrusion detection, federated learning, and blockchain. He has also served and con- tinues to serve on technical program committees and as a reviewer of several inter- national conferences and journals, including IEEE ICC, IEEE Globecom, and IEEE Transactions. Dr. Muhammad Fazal Ijaz received his BEng degree in Industrial Engineering and Management from University of the Punjab, Lahore, Pakistan, in 2011, and his DrEng degree in Industrial and Systems Engineering from Dongguk University, Seoul, South Korea, in 2019. From 2019 to 2020, he worked as Assistant Professor in the Department of Industrial and Systems Engineering, Dongguk University, Seoul, South Korea. Currently, he is working as Assistant Professor in the Department of
  • 17. xi About the Editors Intelligent Mechatronics Engineering, Sejong University, Seoul, Korea. He has pub- lished numerous research articles in several international peer-reviewed journals, including Scientific Reports, IEEE Transactions on Industrial Informatics, IEEE Access, Sensors, Journal of Food Engineering, Applied Sciences, and Sustainability. His research interests include machine learning, blockchain, healthcare engineering, the Internet of Things, big data, and data mining.
  • 19. xiii Contributors Zaigham Abbas International Islamic University Islambad, Pakistan Qasem Abu Al-Haija Princess Sumaya University for Technology Jordan Syed Immamul Ansarullah Government Degree College Sumbal Srinagar, India Hira Arshad Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Muhammad Yaseen Ayub COMSATS University Attock Campus, Pakistan Tarandeep Kaur Bhatia University of Petroleum and Energy Studies (UPES) Bidholi, India Gowhar Mohi ud din Dar Lovely Professional University Phagwara, India Salma El Hajjami Ibnou Zohr University Agadir Morocco Zakaria Abou El Houda L@bISEN, ISEN Yncréa Ouest Carquefou, France Muhammad Fayaz University of Central Asia Naryn Kyrgyzstan Usman Haider National University of Computer and Emerging Sciences Islamabad, Pakistan Rahmeh Ibrahim Princess Sumaya University for Technology Jordan Shahbaz Ali Imran Birmingham City University Birmingham, UK Mamoona Jamil Isra University Islamabad Pakistan Denis Jangeed Geetanjali Institute of Technical Studies Udaipur, India Aftab Alam Janisar Universiti Teknologi Petronas Seri Iskandar, Perak, Malaysia Inam Ullah Khan Isra University Islamabad Campus Pakistan Latif Khan Geetanjali Institute of Technical Studies Udaipur, India Salman Khan Abdul Wali Khan University Mardan Pakistan Mudasir Manzoor Kirmani FoFy, SKAUST-Kashmir India
  • 20. xiv Contributors Hanane Lamaazi College of Information Technology UAE University, Abu Dhabi, United Arab Emirates Hafsa Maryam University of Cyprus Nicosia, Cyprus Vijendra Kumar Maurya Geetanjali Institute of Technical Studies Udaipur, India Muna Muhammad Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Ziema Mushtaq Cluster University Srinagar India Fahad Naveed Federal Urdu University of Arts Science & Technology Islamabad, Pakistan Bakhtawar Nawaal University of Engineering and Technology Taxila, Pakistan Mariya Ouaissa Cadi Ayyad University Marrakech, Morocco Mariyam Ouaissa Chouaib Doukkali University El Jadida, Morocco Muhammad Allah Rakha FAST National University Peshawar, Pakistan Ahthasham Sajid Baluchistan University of Information Technology Engineering and Management Sciences Quetta, Baluchistan, Pakistan Abdul Qahar Shahzad Quaid-I-Azam University Islamabad, Pakistan Hina Shoukat COMSATS University Islamabad Attock, Pakistan Bhupendra Kumar Soni Geetanjali Institute of Technical Studies Udaipur, India Muhammad Tehmasib Ali Tashfeen Wichita State University Wichita, Kansas, United States Rehmat Ullah Cardiff Metropolitan University Cardiff, UK Ubaid Ullah University of Wah Wah Cantt, Pakistan Muhammad Usama University of Wah Wah Cantt, Pakistan Aliyu Yusuf Universiti Teknologi Petronas Seri Iskandar, Perak, Malaysia Syeda Zillay Nain Zukhraf University of Cyprus, Nicosia, Cyprus Department of Electrical Engineering National University of Computer and Emerging Sciences Peshawar, Pakistan Zupash COMSATS University Islamabad Attock, Pakistan
  • 21. 1 DOI: 10.1201/9781003404361-1 Cyber Security 1 Future Trends and Solutions Syed Immamul Ansarullah, Mudasir Manzoor Kirmani, Ziema Mushtaq, and Gowhar Mohi ud din Dar 1.1 INTRODUCTION Before the beginning of 1970, viruses, Trojan horses, worms, spyware, and malware were not even part of the mainstream lexicon of information technology. Robert Thomas, a BBN Technologies researcher in Cambridge, Massachusetts, created the first computer “worm” and named that “Creeper” [1]. By jumping between systems, the Creeper disseminated infection; to combat this virus, Ray Tomlinson created the Reaper, the first antivirus application that would seek out and destroy Creeper [2]. In 1988, Robert Morris desired to determine the magnitude of the Internet and to accomplish this, he developed software that accessed UNIX terminals, traversed networks, and cloned itself. The Morris worm was so destructive that it rendered computers unusable by substantially reducing their speed [3]. From that moment on, viruses became more lethal, pervasive, and difficult to manage. With it came the advent of cyber security. The collective set of technology, methods, and procedures that businesses utilize to safeguard their computing environments from harm and unauthorized data access caused by online criminals or nefarious insiders is known as cyber security [4]. Organizations typically have a structure and system in place for dealing with attempted or successful cyber attacks. An effective framework can aid in threat detection and identification, network and system protection, and recovery in the event that an attack is successful. Cybersecurity is included in all systems that are vulnerable to threats and attacks to stop things like identity theft, cyber stalking, data loss, loss of sensitive data, and extortion attempts [5]. Sensitive information about themselves as well as their clients is held by critical infrastructures, including hospitals, financial services firms, power plants, etc. To operate without interruption, cyber threat researchers find new vulnerabilities, improve open-source tools, and inform people about the significance of cyber security. Since the introduction of the first mainframes, the CIA (confiden- tiality, integrity, and availability) triangle has been the de facto industry standard for computer security [6]. Figure 1.1 shows the CIA triad in cybersecurity. • Confidentiality: Maintaining confidentiality requires not divulging infor- mation to unauthorized parties. It involves making an effort to safeguard the privacy and anonymity of authorized parties engaged in data sharing
  • 22. 2 Cyber Security for Next-Generation Computing Technologies and storage. Decrypting data that has been inadequately encrypted, man- in-the-middle (MITM) attacks, and disclosing sensitive information fre- quently compromise secrecy. Data encryption, two-factor authentication, biometric verification, security tokens, and other standard procedures are utilized to protect confidentiality. • Integrity: Integrity relates to preventing unauthorized parties from altering information. It is required that information and programs can only be modified in certain and authorized ways. Integrity risks include turning a computer into a “zombie computer” and infecting online pages with malware. Typically, the following methods are used to ensure data integrity: cryptographic checksums, uninterrupted power supplies, data backups, etc. • Availability: Availability ensures that the information is accessible to authorized users when required. Data is only helpful if it is accessible to the right people at the right time. Information inaccessibility may result from security vulnerabilities such as DDoS attacks, hardware failure, poor soft- ware, or human error. Common practices for ensuring availability include backing up data to external drives, installing firewalls, having a backup power supply, and replicating data. FIGURE 1.1 CIA (confidentiality, integrity, and availability) triad in cyber security.
  • 23. 3 Cyber Security 1.2 TYPES OF CYBER SECURITY Cyber security can broadly be divided into seven pillars [7–9]: 1. Network Security: A planned set of guidelines and configurations is used to secure networks and data by ensuring their confidentiality, integrity, and accessibility. By safeguarding the infrastructure, network security aims to defend internal networks from intruders. The majority of attacks take place across networks, and network security solutions are made to spot and stop these attacks. These solutions incorporate data and access controls, includ- ing next-generation firewall (NGFW) application restrictions, network access control (NAC), data loss prevention (DLP), identity access manage- ment (IAM), and NAC (identity access management), to enact safe online use regulations. Technologies for advanced and multilayered network threat prevention include NGAV (next-gen antivirus), sandboxing, and CDR (con- tent disarm and reconstruction). Additionally significant are automated SOAR (security orchestration and response) solutions, threat hunting, and network analytics [10]. 2. Cloud Security: Technology, services, controls, and policies that safe- guard cloud data, infrastructure, and applications against online threats and attacks are referred to as cloud security [11]. Although a lot of cloud service providers offer security solutions, these are sometimes insufficient for pro- viding enterprise-grade security in the cloud. Amazon AWS and Microsoft Azure are two examples of public cloud computing, while VMmare or OpenStack are examples of private clouds. The multi-cloud aspect of cloud security presents several unique issues, including visibility, compliance, and cost control. Enabling MFA on all accounts, enabling security logs, encrypting your data, and double-checking your compliance needs are the standard procedures to take into account for cloud security. 3. Mobile Security: Mobile security, also referred to as wireless security, is the safeguard put in place to protect mobile devices like laptops, tablets, and smartphones, as well as the networks to which they are linked, from the dangers and risks associated with wireless computing [12]. Mobile devices like tablets and smartphones, which are frequently disregarded, have access to company data, putting firms at risk from phishing, malicious software, and IM (instant messaging) assaults. These attacks are stopped by mobile security, which also protects operating systems and devices from rooting. This enables businesses to guarantee that only compliant mobile devices have access to company assets when combined with an MDM (mobile device management) solution. 4. Endpoint Security: Companies must protect end user devices like desk- tops/laptops and servers, mobile devices, network devices (routers, switches, and access points) with endpoint detection and response (EDR) solutions, advanced threat prevention (such as anti-phishing and anti-ransomware), and data and network security controls [13].
  • 24. 4 Cyber Security for Next-Generation Computing Technologies 5. IoT Security: Although deploying Internet of Things (IoT) devices undoubt- edly increases productivity, it also exposes businesses to new online threats. Threat actors look for weak devices that are unintentionally connected to the Internet in order to utilize them for illicit purposes like gaining access to corporate networks. With the help of auto-segmentation to manage net- work activity, discovery and classification of connected devices, and the use of IPS as a virtual patch to thwart attacks on susceptible IoT devices, IoT security safeguards these gadgets [14]. To guard against exploits and run- time attacks, the firmware of the device may in some situations be supple- mented with tiny agents. 6. Application Security: Addressing vulnerabilities originating from unsafe development procedures when creating, coding, and releasing software or a website is known as application security. It is crucial to integrate security standards, procedures, methods, and tools to safeguard applications dur- ing all phases of development because applications are directly accessible across networks. Cross-site scripting (XSS), DDoS attacks, lax access con- trols, a lack of encryption, etc. are problems with application security [15]. Risk assessment, patching, secure development, web application firewalls, encryption software, and application security testing are some of the proce- dures and solutions to take into consideration for this kind of cyber security. 7. Zero Trust: Zero trust security, which takes a more granular approach to security by securing specific resources through a mix of micro- segmentation, monitoring, and the implementation of role-based access controls, means that, by default, no one is trusted from inside or outside the network [16]. Continuous monitoring and validation, least privilege, device access control, micro-segmentation, preventing lateral movement, and mul- tifactor authentication are the core tenets of zero trust. 1.3 CYBER SECURITY THREATS The main types of cyber security threats that companies face today are discussed next. 1.3.1 MALWARE Malware is malicious software designed to perform a range of unwanted tasks on a compromised machine [17]. Some of the most common kinds of malicious software are: • Ransomware: Files on a device infected with ransomware are encrypted using a key known only to the attacker. The creator of the ransomware then asks money in exchange for the decryption key [18]. Ransomware has become one of the most widespread and expensive cyber dangers that busi- nesses face in recent years. • Trojan Horse: Trojan horses are a type of malicious software that can trick users into downloading it by seeming to be a legitimate, free version of a
  • 25. 5 Cyber Security paid program. After a victim downloads and runs the Trojan, it will begin performing malicious actions on the infected machine [19]. • Remote Access Trojan (RAT): Trojans designed to serve as a backdoor for additional attacks are known as remote access Trojans (RATs). Once the virus is active on an infected machine, the attacker gains access to the system remotely and can then steal data, install further malware, or execute other malicious activities [20]. • Spyware: Spyware is a form of malware that monitors a user’s activity on their computer and records that data. Hackers create spyware to gain access to private information that may be sold or used in future assaults [21]. This information can include login credentials, financial data, and other sensitive details. • Cryptojacking: In order to add new blocks to the blockchain, Proof of Work (PoW) cryptocurrencies require a computationally intensive process called mining. In order to mine cryptocurrency, cryptojacking malware installs itself on a compromised computer and uses its processing power to create blocks [22]. 1.3.2 SOCIAL ENGINEERING ATTACKS Social engineering attacks involve deception, compulsion, and other forms of psy- chological manipulation to persuade the target to perform the desired action. Typical instances of social engineering techniques are as follows: • Phishing: Phishing is one form of social engineering in which the target is tricked into providing information or doing some other action that benefits the attacker [23]. The goal of phishing is to trick users (using emails, social media posts, and other kinds of electronic communication) into visiting a harmful website, downloading a malicious file, or providing personal infor- mation such as passwords. • Spear Phishing: Spear phishing assaults are a type of phishing in which the attacker tries to trick a specific person or group into giving over sensitive information by posing as a trustworthy organization [24]. A spear phishing email sent to the accounts payable clerk can, for instance, falsely claim to be from one of the company’s legitimate vendors or suppliers, demanding payment for goods or services already rendered. • Smishing: What we call “smishing” attacks originate from “phishing,” except they use text messages instead of email [25]. These attacks take advantage of smartphone features, such as the ability to hover the mouse over an SMS link to see where it leads and the prevalence of link shortening services (like bit.ly). • Vishing (Voice-Based Phishing): Vishing uses similar techniques to phishing but takes place over the phone. Convincing a victim to do a mali- cious action or reveal private information like passwords or credit card numbers is an attack technique [26].
  • 26. Random documents with unrelated content Scribd suggests to you:
  • 27. © Triangle Film Corp. (C. Gardner Sullivan, author); 23Jan16; LP10729. THE CONQUEROR. 1917. For Fox Film Corp. 8 reels. Based on the life of Sam Houston. Credits: Scenario and direction, R. A. Walsh; story, Henry Christeen Warnack. © William Fox (Raoul Walsh, author); 9Sep17; LP11362. THE CONQUERORS. 1932. 9 reels. Credits: Director, William A. Wellman; story, Howard Estabrook; screenplay, Robert Lord. © RKO Radio Pictures, Inc.; 18Nov32; LP3453. CONQUEST. Trailer announcement, 1928. 1 reel, sd. Credits: Musical director, Louis Silvers. © The Vitaphone Corp.; 29Dec28; MP5668. CONQUEST. 1928. 8 reels. From the novel by Mary Imlay Taylor. Credits: Director, Roy del Ruth; screenplay, C. Graham Baker; adaptation, Eve Unsell. © Warner Bros. Pictures, Inc.; 18Dec28; LP25927. CONQUEST. A Clarence Brown production. 1937. 6 reels, sd., b&w. Based on a book by Waclaw Gasiorowski and a dramatization by Helen Jerome. Credits: Producer, Bernard H. Hyman; director, Clarence Brown; screenplay, Samuel Hoffenstein, Salka Viertel, S. N. Behrman; film editor, Tom Held; music score, Herbert Stothart. © Metro-Goldwyn-Mayer Corp.; 26Oct37; LP7547. THE CONQUEST OF CANAAN. 1921. 7 reels. From the story by Booth Tarkington. Credits: Director, R. William Neill; scenario, Frank W. Tuttle.
  • 28. © Famous Players-Lasky Corp.; 20Aug21; LP16883. THE CONQUEST OF CLAIRE. © 1914. © Pathé Frères (Messter Film Co., author); title, descr. & 72 prints, 27Apr14; LU2593. THE CONQUEST OF CONSTANTIA. 1915. 1 reel. Credits: Director, Courtlandt Van Deusen. © The Vitagraph Co. of America (W. A. Tremayne, author); 11Nov15; LP6949. THE CONQUEST OF NEW FRANCE. SEE The Gateway to the West. Wolfe and Montcalm. CONQUEST OF THE HUDSON. © 1938. 2 reels. © The Port of New York Authority (Marion Sanders, author); title, descr. & 13 prints, 19Jan38; MU8081. CONRAD IN QUEST OF HIS YOUTH. 1920. 6 reels. From the novel by Leonard Merrick. Credits: Director, William De Mille; scenario, Olga Printzlau. © Famous Players-Lasky Corp.; 8Nov20; LP15788. CONRAD NAGEL [in] VITAPHONE TRAILER ANNOUNCEMENT, CAUGHT IN THE FOG. 1928. 1 reel, sd. © Warner Brothers Pictures, Inc.; 12Sep28; MP5351. CONRAD NAGEL [in] VITAPHONE TRAILER ANNOUNCEMENT, LIGHTS OF NEW YORK. 1928. 1 reel, sd. © Warner Bros. Pictures, Inc.; 30Jul28; MP5228. CONSCIENCE. Imp. 1915. 4 reels. Credits: Curtis Benton; production and scenario, Stuart Paton. © Universal Film Mfg. Co., Inc.; 18Jun15; LP5612. CONSCIENCE. 1917. For Fox Film Corp. 6 reels.
  • 29. Credits: Director, Bertram Bracken; story, J. Searle Dawley, E. Lloyd Sheldon; scenario, Adrian Johnson. © William Fox (J. Searle Dawley & E. Lloyd Sheldon, authors); 6Oct17; LP11504. CONSCIENCE. SEE Trust Your Wife. CONSCIENCE AND THE TEMPTRESS. © 1914. © Selig Polyscope Co. (Malcolm Douglas, author); title, descr. & 31 prints, 7Jan14; LU1921. THE CONSCIENCE FUND. © 1913. © Selig Polyscope Co. (Gilson Willets, author); title, descr. & 64 prints, 8Oct13; LU1351. THE CONSCIENCE OF HASSAN BEY. © 1913. © Biograph Co. (W. C. Cabanne, author); title, descr. & 77 prints, 15Dec13; LU1802. CONSCIENTIOUS CAROLINE. 1914. 1 reel. Credits: Ashley Miller. © Thomas A. Edison, Inc.; 16May14; LP2719. CONSCRIPTION. SEE Her Boy. CONSECRATION OF MATAOS II. FUNERAL OF MATAOS II. © 1912. © Kachadoor H. Mesropian (A. M. Sebastianske, author); title, descr. & 4 prints, 7Oct12; LU57. CONSERVATION OF NATURAL RESOURCES. 1938. 1 reel. © Erpi Classroom Films, Inc. (Wallace W. Atwood, author); 1Jan38; MP8284. CONSERVING THE INSURANCE ESTATE. 1932. Filmstrip. © The Northwestern Mutual Life Insurance Co. (Nelson D. Phelps & R. P. Thierbach, authors); 8Sep32; MP3967. CONSOLATION MARRIAGE. 1931. 9 reels, sd.
  • 30. Credits: Associate producer, Myles Connolly; director, Paul Sloane; original story, Bill Cunningham; screenplay and dialogue, Humphrey Pearson. © RKO Radio Pictures, Inc.; 17Oct31; LP2579. CONSPIRACY; or, A FOUR MILLION DOLLAR DOWRY. © 1914. © Société Française des Films et Cinématographes Éclair, Inc.; title, descr. & 87 prints, 9Feb14; LU2115. THE CONSPIRACY. Bison. 1916. 2 reels. Credits: William Parker; director, Henry McRae. © Universal Film Manufacturing Co., Inc., 5Oct16; LP9250. CONSPIRACY. 1930. 7 reels, sd. From the stage play by Robert Baker and John Emerson. Credits: Producer, William LeBaron; director, Christy Cabanne; assistant director, Dewey Starkey; screenplay, continuity and dialogue, Beulah Marie Dix; film editors, Artie Roberts, Sam White. © RKO Productions, Inc.; 27Jul30; LP1452. CONSPIRACY. 1939. 59 min., sd. Credits: Production executive, Lee Marcus; producer, Cliff Reid; director, Lew Landers; story, John McCarthy, Faith Thomas; screenplay, Jerome Chodorov; film editor, George Hively; music director, Frank Tours. © RKO Radio Pictures, Inc.; 8Sep39; LP9155. THE CONSPIRACY AT THE CHATEAU. 1915. 2 reels. Credits: Edwin Balmer. © Essanay Film Mfg. Co.; 14Apr15; LP5020. THE CONSPIRATORS. © 1914. 35 mm. Credits: Robert Gage.
  • 31. © Selig Polyscope Co. (Robert Gage, author); title, descr. & 49 prints, 22Jan14; LU2001. THE CONSTABLE'S DAUGHTER. © 1915. © American Film Mfg. Co. (J. E. Hungerford, author); title, descr. & 58 prints, 6Mar15; LU4628. THE CONSTABULE. 1929. 22 min., sd. Credits: Director, Mack Sennett; story and dialogue, John A. Waldron. © Mack Sennett, Inc.; 24Sep29; LP712. THE CONSTANCY OF JEANNE; or, LA JOLIE BRETONNE. © 1914. © Pathé Frères; title, descr. & 39 prints, 13Mar14; LU2306. THE CONSTANT NYMPH. Gaumont British Picture Corp. 1934. 7,666 ft., sd. From the novel by Margaret Kennedy. Credits: Director, Basil Dean; screenplay, Dorothy Farnum; dialogue, Margaret Kennedy, Basil Dean; music directors, Eugene Gossen, John Greenwood. © Fox Film Corp.; 23Mar34; LP4579. THE CONSTANT WOMAN. World Wide. Presented by E. W. Hammons. 1933. 76 min., sd. From the play "Recklessness" by Eugene O'Neill. Credits: Director, Victor Schertzinger; screenplay, Warren Duff; adaptation, F. Hugh Herbert. © KBS Productions, Inc.; 18Mar33; LP3990. CONSTANTINOPLE. SEE Christian Crusaders in Constantinople. CONTACT. 1932. 1 reel. Credits: Director, Joseph Henabery; story, Sig Herzig, Burnet Hershey. © The Vitaphone Corp.; 21Sep32; LP3286.
  • 32. CONTENT. (Herbert Kaufman's Weekly) 1920. 1 reel. Credits: Herbert Kaufman; director, Wray Physioc; scenario, Merle Johnson. © Selznick Pictures Corp.; 1May20; LP15074. CONTENTED CALVES. 1934. 2 reels, sd. Credits: Producer, Lou Brock; director, Sam White; story, Joseph A. Fields, Rolly Asher; film editor, Edward Mann. © RKO Radio Pictures, Inc.; 6Aug34; LP4869. CONTENTED WIVES. (Cameo Comedy) 1929. 1 reel. Credits: Director, Francis J. Martin. © Educational Film Exchanges, Inc.; 28Jul29; LP627. A CONTENTED WOMAN. 1917. 2 reels. From the play by Charles Hoyt. Credits: Director, J. A. Richmond. © Selig Polyscope Co.; 10Sep17; LP11401. THE CONTENTS OF THE SUITCASE. 1913. 1 reel. © Thomas A. Edison, Inc.; 15Sep13; LP1257. THE CONTINENT OF SOUTH AMERICA. 1931. 962 ft. © Eastman Teaching Films, Inc. (George W. Hoke, author); 17Jun31; MP2829. A CONTINENTAL EVENING. 1930. 1 reel, sd. Credits: Director, Jasper Ewing Brady. © Columbia Pictures Corp.; 7Feb30; LP1057. CONTRA LA CORRIENTE (AGAINST THE CURRENT). 1935. 11 reels. Credits: Direction, text and continuity, Ramon Novarro. © Ramon Novarro Samaniegos; 13Aug35; LP5711.
  • 33. THE CONTRABAND. © 1913. © Monarch Feature Film Co. (Deutsche Kinomatographen Gesellschaft, author); title, descr. & 104 prints, 31Jul13; LU1044. CONTRABAND. Paramount. Presented by Adolph Zukor and Jesse L. Lasky. 1925. 6,773 ft. From the novel by Clarence Budington Kelland. Credits: Producer, Alan Crosland; screenplay, Jack Cunningham. © Famous Players-Lasky Corp.; 10Feb25; LP21107. CONTRACEPTIVE METHOD AND TECHNIQUE. 1935. 2 reels. Credits: Producer and director, Marie Pichel Warner. © Marie Pichel Warner; 18Oct35; MP6109. CONTRARY MARY. SEE The Summer Girl. CONTRARY MARY WITH BOBBY WATSON. 1930. 1 reel, sd. © The Vitaphone Corp.; 19Mar30; MP1294. CONTRASTS IN CHINA. (Vagabond Adventure Series) 1933. 10 min., sd. Credits: Text, Russel Spaulding; narrator, Alois Havrilla. © RKO Radio Pictures, Inc. (The Van Beuren Corp., author); 15May33; MP4057. CONTROL YOURSELF. 1925. 2 reels. Credits: Supervision, George E. Marshall; director, Robert P. Kerr; story, Andrew Bennison. © William Fox (Fox Film Corp., author); 15Nov25; LP22054. CONVENTION CITY. 1933. 8 reels, sd. Credits: Director, Archie Mayo; story, Peter Milne; screenplay, Robert Lord. © First National Pictures, Inc.; 26Dec33; LP4359.
  • 34. CONVERGING PATHS. 1916. 2 reels. Credits: Director, Burton L. King. © Selig Polyscope Co. (Hattie Gray Baker, author); 23Sep16; LP9189. THE CONVERSION OF MR. ANTI. © 1913. © Selig Polyscope Co. (Philip Lenoir, author); title, descr. & 32 prints, 1Nov13; LU1513. THE CONVERSION OF SMILING TOM. 1915. 1 reel. Credits: Producer, Tom Mix; story, Emma Bell. © Selig Polyscope Co. (Emma Bell, author); 10Apr15; LP4985. CONVERTING TIME INTO MONEY. 1931. Filmstrip. © The Northwestern Mutual Life Insurance Co. (Nelson D. Phelps & Russell P. Thierbach, authors); 11Nov31; MP3080. CONVICT, COSTUMES, AND CONFUSION. 1914. 2 reels. Credits: Director, Leo Beggs. © The Vitagraph Co. of America (A. L. Stillman, author); 10Nov14; LP3738. THE CONVICT KING. 1915. 3,000 ft. Credits: Producer, Edward Sloman. © Lubin Mfg. Co. (Dudley Glass, author); 22Dec15; LP7294. CONVICT 993. Astra Film Corp. © 1918. Credits: Director, William Parke; story, Wallace Clifton. © Pathe Exchange, Inc. (Wallace C. Clifton, author); title, descr. & 65 prints, 3Apr18; LU12256. CONVICT NO. 113. © 1914. ** © Itala Film Co. of America; title, 25Jul14; descr., 27Feb14; 46 prints, 10Jul14; LU3092.
  • 35. CONVICT 13. 1920. 2 reels. Credits: Written and directed by Buster Keaton, Eddie Cline. © Metro Pictures Corp.; 4Oct20; LP15633. CONVICTED. 1938. 6 reels, sd. Credits: Director, Leon Barsha; story, Cornell Woolrich; screenplay, Edgar Edwards; film editor, William Austin. © Columbia Pictures Corp. of California, Ltd.; 15Aug38; LP8202. CONVICT'S CODE. 1939. 7 reels, sd. Credits: Producer, E. B. Derr; director, Lambert Hillyer; original screenplay, John W. Krafft. © Monogram Pictures Corp.; 10Jan39; LP8549. THE CONVICT'S SON. © 1914. © Nordisk Films Co. (H. Lenthel, author); title, descr. & 55 prints, 20Feb14; LU2183. THE CONVICT'S THREAT. 1915. 2,000 ft. © Essanay Film Mfg. Co.; 17Sep15; LP6406. CONVINCE 'EM FROM OVERTURE TO FINALE. 1930. 1 reel. © Willys-Overland, Inc. (Raymond J. Faller, author); 15Apr30; MP1501. CONVOY. Presented by Robert Kane, in conjunction with Victor H. and Edward R. Halperin. 1927. 8 reels. From the story "The Song of the Dragon" by John Taintor Foote. Credits: Director, Joseph C. Boyle; scenario, Willis Goldbeck. © First National Pictures, Inc.; 11Apr27; LP23841. COO COO NEWS. (Paramount Varieties) Presented by Adolph Zukor. 1935. 1 reel, sd. © Paramount Productions, Inc.; 24Jan35; MP5335.
  • 36. COO-COO, THE MAGICIAN. (A Flip the Frog Cartoon) 1933. 1 reel, sd. © Metro-Goldwyn-Mayer Distributing Corp.; 6Mar33; MP3858. COOCOONUT GROVE. (Merrie Melodies) 1936. 1 reel, sd., color. Credits: Producer, Leon Schlesinger; supervision, I. Freleng; animation, Bob McKimson, Sandy Walker; music director, Carl E. Halling. © The Vitaphone Corp.; 21Dec36; MP6989. THE COOK. (Krazy Kat) © 1917. © International Film Service, Inc.; title, descr. & 6 prints, 7Jun17; LU10899. THE COOK. Released by Paramount. 1918. 2 reels. Credits: Written and directed by Fatty Arbuckle. © Comique Film Corp.; 20Aug18; LP12764. THE COOK OF CANYON CAMP. 1917. 5 reels. Credits: Story and direction, Donald Crisp; scenario, Donald Crisp, Julia Crawford Ivers. © Oliver Morosco Photoplay Co.; 30Jun17; LP11033. COOK, PAPA, COOK. (Cameo Comedy) 1928. 1 reel. Credits: Director, Wallace McDonald. © Educational Film Exchanges, Inc.; 20Sep28; LP25626. THE COOKIE CARNIVAL. (Silly Symphony) 1935. 1 reel, sd. © Walt Disney Productions, Ltd.; 20May35; MP5646. COOKING THE GOOSE. SEE The Runaway Bride. COOKS AND CROOKS. 1918. 2 reels. Credits: Director, James Davis. © L-Ko Motion Picture Kompany; 7Mar18; LP12156.
  • 37. THE COOK'S MISTAKE. 1915. 1 reel. Credits: Director, W. F. Smith. © Thomas A. Edison, Inc.; 1Apr15; LP4915. COOKS VERSUS CHEFS. 1916. 1 reel. © International Film Service, Inc. (Tom E. Powers, author); 21Jan16; MP508. COOL HEADS. © 1938. B&w, 35 mm. © E. I. du Pont de Nemours & Co. (Horace L. Roberts, author); title, descr. & 3 prints, 27Sep38; MU8832. COOL OFF! Educational Film Exchanges, Inc. 1926. 2 reels. Credits: Director, William Watson; story, Sig Herzig. © Christie Film Co., Inc.; 13Dec26; LP23427. A COORIAL ON THE ORINOCO. 1918. 1 reel. © C. L. Chester; 21Jul18; MP1229. THE COP. 1928. Produced by Ralph Block for De Mille Pictures Corp. 8 reels. Credits: Producer and director, Donald Crisp; story, Elliott Clawson; screenplay, Tay Garnett; film editor, Barbara Hunter. © Pathe Exchange, Inc.; 11Jul28; LP25458. THE COP AND THE ANTHEM. 1917. 2 reels. From the story by O. Henry [pseud. of William Sydney Porter]. Credits: Director, Thomas R. Mills; adaptation, Edward J. Montagne. © Broadway Star Features Co., Inc.; 11May17; LP10748. THE COP ON THE BEAT. © 1914. © Selig Polyscope Co. (E. Lynn Summers, author); title, descr. & 43 prints, 13Mar14; LU2311.
  • 38. COPENHAGEN. (A Fitzpatrick Traveltalk) 1937. 817 ft., sd., color. Credits: Director, Ralph E. Donaldson; music score, Jack Shilkret. © Metro-Goldwyn-Mayer Corp.; 5Nov37; MP7963. COPLEY IN THE FAR EAST. © 1918. © Eugene W. Copley; title & descr., 8Feb18; 24 prints, 4Mar18; MU1164. COPPER. Imp. 1915. 2 reels. © Universal Film Mfg. Co., Inc.; 1Jul15; LP5715. THE COPPER BEECHES. © 1912. From "The Adventures of Sherlock Holmes" by Sir A. Conan Doyle. © Société Française des Films & Cinématographes Éclair; title, descr. & 41 prints, 4Nov12; LU88. COPPER MINES AT BINGHAM, UTAH. 1912. 400 ft. © Thomas A. Edison, Inc.; 10Oct12; MP5. THE COPPERHEAD. 1919. 7 reels. From the play by Augustus Thomas, founded on the novel "The Glory of His Country" by Frederick Landis. Credits: Direction and scenario, Charles Maigne. © Famous Players-Lasky Corp.; 31Dec19; LP14633. COPS. Presented by Joseph M. Schenck. 1922. 2 reels. Credits: Written and directed by Buster Keaton and Eddie Cline. © Comique Film Co., Inc.; 15Feb22; LP17630. COPS AND CUSSEDNESS. 1917. 1 reel. Credits: Director, Lawrence Semon; story, Lawrence Semon, Graham Baker. © The Vitagraph Co. of America; 5Feb17; LP10118. COPS AND CUSSEDNESS. 1920. 1 reel.
  • 39. Credits: Director, Graham Baker; story, Lawrence Semon, Graham Baker. © Vitagraph Co. of America; 26Jan20; LP14677. COPS! AND ROBBERS! (Grantland Rice Sportlight) 1938. 1 reel, sd. Credits: Narrator, Ted Husing. © Paramount Pictures, Inc.; 25Mar38; MP8276. THE COP'S BRIDE. 1929. 1 reel. Credits: Paul Terry. © Pathe Exchange, Inc.; 17Mar29; MP3. COPS IS ALWAYS RIGHT. 1938. 1 reel, sd. Credits: Director, Dave Fleischer; animation, Seymour Kneitel, William Henning. © Paramount Pictures, Inc.; 30Dec38; MP9019. COPY. (Metro Movietone Act) 1929. 2 reels, sd., b&w. Credits: Kendall Banning, Harold Kellock; director, Norman Houston. © Metro-Goldwyn-Mayer Distributing Corp.; 17Dec29; MP951. COQUETTE. 1929. 9 reels. Based on the Jed Harris stage production of the play by George Abbott and Ann Preston Bridgers. Credits: Adaptation, John Grey, Allen McNeil; dialogue, Sam Taylor. © The Pickford Corp. (John Grey, Allen McNeil & Sam Taylor, authors); 30Mar29; LP560. THE COQUETTE'S AWAKENING. 1915. 2 reels. Credits: Director, Frank Beal. © Selig Polyscope Co. (Will M. Hough, author); 27Nov15; LP7099.
  • 40. CORA. 1915. 5 reels. © Metro Pictures Corp.; 10May15; LP6426. CORA GREEN, THE FAMOUS CREOLE SINGER. 1929. 1 reel. © The Vitaphone Corp.; 20Aug29; MP535. CORAL. Bison. 1915. 4 reels. Credits: Producer, Henry McRae; scenario, Olga P. Clark. © Universal Film Mfg. Co., Inc.; 27Aug15; LP6221. CORAL ISLE OF THE ATLANTIC. (World on Parade, no. 6) 1936. 1 reel. Credits: Russell Spalding. © The Van Beuren Corp.; 27May36; MP6418. CORA'S SACRIFICE. © 1917. © Nordisk Films Kompagni, A/S; title, descr. & 85 prints, 2Jan17; LU9872. CORDELIA THE MAGNIFICENT. 1923. 7 reels. Based on the novel by Leroy Scott. Credits: Director, George Archainbaud. © Samuel Zieler Photoplay Corp.; 11Jun23; LP19379. THE CO-RESPONDENT. Advanced Motion Pictures. 1917. 6 reels. Based on the stage play by Alice Leal Pollock and Rita Weiman. Credits: Director, Ralph W. Ince. © Jewel Productions, Inc.; 11Oct17; LP11550. CORINNE, COME HERE. © 1919. Credits: Producer, Charles E. Bartlett. © Pathe Exchange, Inc. (Chas. E. Bartlett, author); title, descr. & 30 prints, 10Jan19; LU13248. A CORN-FED SLEUTH. Century. 1923. 2 reels.
  • 41. Credits: Written and directed by Al Herman. © Universal Pictures Corp.; 26Oct23; LP19547. CORN GROWING. 1928. 1 reel. © Eastman Kodak Co. (George W. Hoke, author); 7Mar28; MP4929. CORN ON THE COP. 1934. 2 reels, sd. Credits: Director, Ralph Staub; story, Jack Henley, Dolph Singer. © The Vitaphone Corp.; 23Apr34; LP4634. CORNELL. (The Spirit of the Campus) Presented by E. W. Hammons. 1932. 1 reel, sd. Credits: Director, Aubrey Scotto; story, Millard Gibson, Gar O'Neil. © Larry Kent Productions, Inc.; 18Dec32; MP4026. THE CORNER. © 1915. © Triangle Film Corp. (C. Gardner Sullivan, author); title, descr. & 402 prints, 15Dec15; LU7207. THE CORNER. 1916. 5 reels. © Triangle Film Corp. (C. Gardner Sullivan, author); 9Jan16; LP10835. THE CORNER GROCER. Presented by William A. Brady. © 1917. Credits: Director, George Cowl; story, Adolph Phillips; scenario, Lawrence McCloskey. © World Film Corp. (Lawrence McCloskey, author); title & descr., 17Sep17; 240 prints, 24Sep17; LU11455. A CORNER IN COTTON. Quality Pictures Corp. 1916. 5 reels. Credits: Director, Fred J. Balshofer. © Metro Pictures Corp.; 19Feb16; LP7676. A CORNER IN SMITH'S. Black Cat. 1917. 29 min.
  • 42. Credits: Director, Henry Beaumont; story, Edward T. Lowe, Jr. © Essanay Film Mfg. Co.; 3Jul17; LP11054. A CORNER IN WATER. 1916. 1 reel. Credits: Produced and written by Tom Mix. © Selig Polyscope Co. (Tom Mix, author); 2Sep16; LP9078. THE CORNER POCKET. © 1921. © Pathe Exchange, Inc. (Hal E. Roach, author); title, descr. & 20 prints, 10Dec21; LU17338. THE CORNER STORE. SEE Fred Ardath in The Corner Store. CORNERED. 1924. 8 reels. Based on the play by Dodson Mitchell and Zelda Sears. Credits: Director, William Beaudine; adaptation, Hope Loring, Louis Duryea Lighton. © Warner Bros. Pictures, Inc.; 9Aug24; LP20480. CORNERED. 1932. 6 reels, sd. Credits: Director, Reeves Eason; story, William Colt MacDonald; screenplay, Ruth Todd; film editor, Otto Meyer. © Columbia Pictures Corp.; 10Aug32; LP3192. CORNERED. SEE Road to Paradise. THE CORNET. 1915. 1,000 ft. © Lubin Mfg. Co. (George W. Terwilliger, author); 3Jun15; LP5469. CORNFLOWER CASSIE'S CONCERT. SEE Beauty and the Bad Man. CORNWALL, THE ENGLISH RIVIERA. (British Beauty Spots) 1913. 1 reel. © Thomas A. Edison, Inc.; 5Sep13; MP82. CORONADO. Presented by Adolph Zukor. 1935. 8 reels, sd.
  • 43. Credits: Producer, William Le Baron; director, Norman McLeod; story, Brian Hooker, Don Hartman; screenplay, Don Hartman, Frank Butler; editor, Hugh Bennett; music and lyrics, Richard A. Whiting. © Paramount Productions, Inc.; 29Nov35; LP5954. CORONATION OF POPE PIUS XII. 1939. 1 reel. © Castle Films, Inc. (Eugene Castle, author); 20Mar39; MP9265. THE CORONATION OF THE SHAH OF PERSIA. 1914. 660 ft. ** © Gaumout Co.; 8Oct14; LP3571. THE CORONATION OF THEIR MAJESTIES KING GEORGE VI AND QUEEN ELIZABETH. 1937. 1 reel. Credits: Editor, Eugene W. Castle. © Pathegrams, Inc. (Eugene W. Castle, author); 20May37; MP7425. CORPORAL BILLY'S COMEBACK. Big U. 1916. 2 reels. Credits: Producer, George Cochrane; story, Harry Leon Wilson; scenario, Calder Johnstone. © Universal Film Co., Inc.; 17May16; LP8307. CORPORAL CAMERON. SEE Cameron of the Royal Mounted. CORPORAL JIM'S WARD. © 1921. © Irving Cummings Production Co. (R. I. Sinbern, author); title, descr. & 41 prints, 2Jul21; LU16721. CORPORAL KATE. De Mille Pictures Corp. Released by Producers Distributing Corp. 1926. 8 reels. Credits: Supervision, C. Gardiner Sullivan; director, Paul Sloane; story, Zelda Sears, Marion Orth; scenario, Albert Shelby LeVino. © Cinema Corp. of America; 29Nov26; LP23383. THE CORPORAL'S DAUGHTER. 1915. 1,000 ft.
  • 44. Credits: Jack Crawford; director, Langdon West. © Thomas A. Edison, Inc.; 5Jun15; LP5492. THE CORPSE. SEE Atonement. CORRECT ORDERING. © 1935. © Standard Brands, Inc. (Harry G. Kebel, Standard Brands, Inc., employer for hire, author); title, descr. & 65 prints, 4Jun35; MU5626. CORRECT POSITION AND MOVEMENT FOR WRITING. © 1924. © Arthur G. Skeeles; title, descr. & 27 prints, 11Nov24; MU2775. CORRECT SHORTHAND TECHNIQUE. School, Business Administration of the State College of Washington. 1934. 500 ft., 16 mm. Credits: Director, Eleanor Skimin. © Gordon F. Cadisch (Eleanor Skimin and Ethel Wood, authors); 1Oct34; MP5069. CORRECT TECHNIQUE IN ORAL HYGIENE. © 1927. © Bertram B. Machat; title, descr. & 16 prints, 11Apr27; MU3933. THE CORRUPTED FLOWER. © 1913. © Pasquali American Co. (Ernesto Pasquali, author); title, descr. & 222 prints, 4Sep13; LU1200. THE CORSAIR. © 1914. © Eclectic Film Co. (G. Fitzmaurice, author); title & descr., 24Oct14; 144 prints, 19Oct14; LU3584. CORSAIR. United Artists. 1931. 8 reels. From a novel by Walton Green. Credits: Producer, Roland West; adaptation, Josephine Lovett. © Art Cinema Corp. (Walton Green, author); 28Oct31; LP2668.
  • 45. THE CORSAIR'S SON. SEE Le Fils du Filibustier. THE CORSICAN BROTHERS. Imp. 1915. 3 reels. Adapted from the novel by Alexander Dumas. Credits: Producer, George A. Lessey. © Universal Film Mfg. Co., Inc.; 8May15; LP5238. COSCIA AND VERDI IN MUSIC-GLORIFIED, CLASSIFIED, AND MORTIFIED. 1928. 1 reel. © Vitaphone Corp.; 15Mar28; MP4830. COSETTE. SEE The Rise of Susan. COSMIC RAY. © 1932. © Neil E. Gordon (Robert A. Millikan, author); title & descr., 10Jun32; 4 prints, 18Jun32; MU3378. THE COSSACK WHIP. 1916. 5 reels, tinted. Credits: James Oppenheim; director, John H. Collins. © Thomas A. Edison, Inc.; 19Sep16; LP9158. THE COSSACKS. 1928. 10 reels, b&w. From the novel by Lyof N. Tolstoi. Credits: Producer and director, George Hill; adaptation and continuity, Frances Marion; film editor, Blanche Sewell. © Metro-Goldwyn-Mayer Distributing Corp.; 23Jun28; LP25438. THE COST. Paramount-Artcraft. Presented by Adolph Zukor. 1920. 6 reels. Credits: Director, Harley Knoles; story, David Graham Phillips; scenario, Ctara S. Beranger. © Famous Players-Lasky Corp.; 28Feb20; LP14812. THE COST OF HATRED. 1917. 5 reels. Credits: Producer, George H. Melford; scenario, Beulah Marie Dix.
  • 46. © Jesse L. Lasky Feature Play Co.; 2Apr17; LP10490. THE COST OF HIGH LIVING. 1916. 1 reel. Credits: Director, William Wolbert. © The Vitagraph Co. of America (Jos. F. Poland, author); 9May16; LP8267. THE COST OF LIVING. SEE Money Means Nothing. COSTA RICA. (Paramount Color Cruises) Presented by Adolph Zukor. 1938. 1 reel, sd., color. Credits: Produced and photographed by Palmer Miller, Curtis F. Nagel; narrator, Gene Hamilton. © Paramount Pictures, Inc.; 2Dec38; MP8947. THE COSTELLO CASE. 1930. 7 reels, sd. Credits: Producers, James Cruze, Sam Zierler; supervision, James Cruze; director, Walter Lang; story, F. McGrew Willis. © Sono Art World Wide Pictures, Inc.; 7Nov30; LP1711. A COSTUME PIECE. 1914. 1 reel. © Vitagraph Co. of America. (George H. Plympton, author); 29Sep14; LP3453. COSTUMES OF THE WORLD. (World Adventures, no. 11) 1933. 1 reel. Credits: E. M. Newman; editor, Bert Frank. © Warner Bros. Pictures, Inc.; 24Jul33; MP4172. COTTON—FROM SEED TO CLOTH. (Harvard Series on Commerce and Industry) 1931. Prepared in cooperation with Nashua Mfg. Co. and produced in collaboration with Harvard University, Dept. of Geology and Geography. 2 reels. Credits: Kirtley F. Mather. © Films of Commerce, Inc.; 1Sep31; MP2786.
  • 47. COTTON GOODS. 1930. 1 reel. © Eastman Teaching Films, Inc. (George W. Hoke, author); 19Feb30; MP1823. COTTON GROWING. 1928. 1 reel. © Eastman Kodak Co. (George W. Hoke, author); 15Mar28; MP4926. THE COTTON KING. © 1915. Based upon the stage play by Sutton Vane. © World Film Corp. (Oscar Eagle, author); title & descr., 31Aug15; 150 prints, 1Sep15; LU6277. COTTON MANUFACTURE. © 1917. © Lincoln & Parker Company, Inc.; title, descr. & 13 prints, 18Oct17; MU1059. COTTON, THE FABRIC OF FASHION. Presented by Aberfoyle Mfg. Co. 1929. Filmstrip, 68 frames. © Rowland Rogers Picture Service, Inc. (Rowland Rogers, author); 23Oct29; MP1526. COTTON, THE HOUSEHOLD FABRIC. Presented by Cannon Mills, Inc. 1930. Filmstrip, 80 frames (11 in color) © Rowland Rogers Picture Service, Inc. (Rowland Rogers, author); 27Feb30; MP1536. COTTONWOOD GULCH. SEE North of the Rio Grande. THE COUGAR; or, MOUNTAIN LION. © 1921. © Pathe Exchange, Inc. (Robert North Bradbury, author); title, descr. & 20 prints, 19Jul21; LU16777. THE COUGAR'S MISTAKE. (Camera Adventures) Educational Pictures. 1933. 9 min. Credits: Producer, Harold Austin; narrator, Felix Adler.
  • 48. © Pat Dowling; 28May33; LP3985. COUGHING HIGGINS. © 1917. © John Ray; title & descr., 11Jun17; 100 prints, 25Jun17; LU10989. COUNSEL FOR CRIME. 1937. 7 reels, sd. Credits: Director, John Brahm; story, Harold Shumate; screenplay, Fred Niblo, Jr., Grace Neville; Lee Loeb, Harold Buchman; film editor, Otto Meyer; music director, Morris Stoloff. © Columbia Pictures Corp. of California, Ltd.; 4Sep37; LP7388. COUNSEL FOR THE DEFENSE. © 1915. © Pathé Frères (Balboa Feature Film Co., author); title, descr. & 90 prints, 6Oct15; LU6568. COUNSEL FOR THE DEFENSE. © 1925. From the novel by Leroy Scott. Credits: Supervision, Edward S. Silton; director, Burton King. © Associated Exhibitors, Inc. (Arthur Hoerl, author); title, descr. & 90 prints, 6Nov25; LU21981. COUNSEL ON DE FENCE. 1934. 2 reels, sd. Credits: Director, Arthur Ripley; story and screenplay, Harry McCoy. © Columbia Pictures Corp.; 29Oct34; LP5070. COUNSELITIS. 1935. 2 reels, sd. Credits: Producer, Lee Marcus; story, and direction, Al Boasberg; film editor, Tholen Gladden. © RKO Radio Pictures, Inc.; 22Nov35; LP5981. COUNSELLOR AT LAW. 1933. 9 reels. From the play by Elmer Rice. Credits: Director, William Wyler; screenplay, Elmer Rice. © Universal Pictures Corp.; 5Dec33; LP4314.
  • 49. THE COUNT. 1916. 2 reels. Credits: Producer, Charles Chaplin. © Lone Star Corp. (Lone Star Film Corp., author); 4Sep16; LP9188. THE COUNT AND THE WEDDING GUEST. 1918. 2 reels. From the story by O. Henry [pseud. of William Sydney Porter]. Credits: Director, Martin Justice; adaptation, Katharine Reed. © Broadway Star Features Co., Inc.; 5Jan18; LP11905. COUNT—EM. 1915. 1 reel. Credits: Director, Ralph Ince. © The Vitagraph Co. of America (Ralph Ince, author); 8Nov15; LP6875. COUNT MACARONI. 1915. 1,000 ft. Credits: Allan Davis; director, Will Louis. © Thomas A. Edison, Inc.; 14Apr15; LP5035. COUNT ME OUT. (Cameo Comedy) 1928. 1 reel. Credits: Director, Zion Myers. © Educational Film Exchanges, Inc.; 28Feb28; LP25009. COUNT ME OUT. (Merrie Melodies) 1938. 7 min., sd., color. Credits: Producer, Leon Schlesinger; supervision, Ben Hardaway, Cal Dalton; story, Melvin Millar; animation, Herman Cohen; music director, Carl W. Stalling. © The Vitaphone Corp.; 21Dec38; MP9145. THE COUNT OF LUXEMBOURG. 1925. 7 reels. Adapted from the operetta of Franz Lehár, with libretto by A. M. Willner and Robert Bodanzky. Credits: Supervision, Hampton Del Ruth; director, Arthur Gregor; adaptation, John F. Natteford, Arthur Gregor.
  • 50. © Chadwick Pictures Corp.; 14Dec25; LP22116. COUNT OF MONTE CRISTO. 1912. 5 reels. © Famous Players Film Co. (Edwin S. Porter & Joseph Golden, authors); 10Dec12; LP188. THE COUNT OF MONTE CRISTO. Released through United Artists. 1934. 13 reels, sd. Based on the novel by Alexandre Dumas. Credits: Supervision, Edward Small; director, Rowland V. Lee; screenplay and dialogue, Philip Dunne, Dan Totheroh, Rowland V. Lee; film editor, Grant Whytock; music director, Alfred Newman. © Reliance Pictures, Inc.; 19Dec34; LP5188. THE COUNT OF MONTE CRISTO. SEE Monte Cristo. THE COUNT OF TEN. Universal Jewel. 1927. 7 reels. Credits: Director, James Flood; original story, Gerald Beaumont; continuity, Harry Hoyt. © Universal Pictures Corp.; 20Oct27; LP24557. THE COUNT TAKES THE COUNT. (Hal Roach Comedy) (Charley Chase Comedy) 1936. 2 reels, sd., b&w. Credits: Directors, Charles Parrott, Harold Law; film editor, William Ziegler. © Metro-Goldwyn-Mayer Corp.; 7Jan36; LP6054. COUNT THE VOTES. Rolin Film Co. © 1919. © Pathe Exchange, Inc. (Rolin Film Co., author); title, descr. & 20 prints, 23Aug19; LP14104. COUNT TWENTY. 1915. 2 reels. © Biograph Co.; 23Nov15; LP7047. COUNT YOUR CHANGE. Rolin Film Co. © 1919. © Pathe Exchange, Inc. (Rolin Film Co., author); title, descr. & 20 prints, 15Jul19; LU13950.
  • 51. Welcome to our website – the ideal destination for book lovers and knowledge seekers. With a mission to inspire endlessly, we offer a vast collection of books, ranging from classic literary works to specialized publications, self-development books, and children's literature. Each book is a new journey of discovery, expanding knowledge and enriching the soul of the reade Our website is not just a platform for buying books, but a bridge connecting readers to the timeless values of culture and wisdom. With an elegant, user-friendly interface and an intelligent search system, we are committed to providing a quick and convenient shopping experience. Additionally, our special promotions and home delivery services ensure that you save time and fully enjoy the joy of reading. Let us accompany you on the journey of exploring knowledge and personal growth! ebookultra.com