|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBOOKCENTRAL_on1005135405 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr nn||||mamaa |
008 |
170812s2018 gw a ob 000 0 eng d |
040 |
|
|
|a AZU
|b eng
|e rda
|e pn
|c AZU
|d YDX
|d N$T
|d EBLCP
|d GW5XE
|d OCLCF
|d NJR
|d OCLCO
|d SNM
|d COO
|d OCL
|d UAB
|d OCLCA
|d MCW
|d U3W
|d CAUOI
|d MERER
|d OCLCQ
|d IAT
|d OCLCQ
|d CEF
|d RRP
|d OCLCQ
|d CNCEN
|d BNG
|d AU@
|d OCLCQ
|d WYU
|d UWO
|d OCLCQ
|d LVT
|d UKMGB
|d VT2
|d LEAUB
|d OCLCQ
|d TXM
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
015 |
|
|
|a GBB8K6820
|2 bnb
|
016 |
7 |
|
|a 019105274
|2 Uk
|
019 |
|
|
|a 1001270761
|a 1001308509
|a 1003197170
|a 1004552526
|a 1012433643
|a 1014398278
|a 1015856521
|a 1031106443
|a 1033680382
|a 1036275281
|a 1039669884
|a 1044528060
|a 1045205852
|a 1047748780
|a 1057425325
|a 1058861519
|a 1060562608
|a 1066461924
|
020 |
|
|
|a 9783319584249
|q (electronic bk.)
|
020 |
|
|
|a 3319584243
|q (electronic bk.)
|
020 |
|
|
|z 9783319584232
|q (hardcover)
|
020 |
|
|
|z 3319584235
|q (hardcover)
|
024 |
7 |
|
|a 10.1007/978-3-319-58424-9
|2 doi
|
029 |
1 |
|
|a AU@
|b 000060972284
|
029 |
1 |
|
|a GBVCP
|b 896249387
|
029 |
1 |
|
|a UKMGB
|b 019105274
|
035 |
|
|
|a (OCoLC)1005135405
|z (OCoLC)1001270761
|z (OCoLC)1001308509
|z (OCoLC)1003197170
|z (OCoLC)1004552526
|z (OCoLC)1012433643
|z (OCoLC)1014398278
|z (OCoLC)1015856521
|z (OCoLC)1031106443
|z (OCoLC)1033680382
|z (OCoLC)1036275281
|z (OCoLC)1039669884
|z (OCoLC)1044528060
|z (OCoLC)1045205852
|z (OCoLC)1047748780
|z (OCoLC)1057425325
|z (OCoLC)1058861519
|z (OCoLC)1060562608
|z (OCoLC)1066461924
|
037 |
|
|
|a com.springer.onix.9783319584249
|b Springer Nature
|
050 |
|
4 |
|a TK5105.59
|b .C66 2018eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a TJK
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Computer and network security essentials /
|c edited by Kevin Daimi.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing,
|c [2018]
|
300 |
|
|
|a 1 online resource (xv, 618 pages 80 illustrations, 50 illustrations in color.) :
|b online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
505 |
0 |
|
|a Part I.COMPUTER SECURITY -- Chapter 1.Computer Security -- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems -- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics -- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining -- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack -- Part II. NETWORK SECURITY -- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks -- Chapter 7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems -- Chapter 8. Security protocols for networks and Internet: A global vision -- Chapter 9. Differentiating Security from Privacy in Internet of Things--A Survey of Threats and Solutions -- Chapter 10. Reliable Transmission Protocol for Underwater Acoustic Networks -- Chapter 11. Using Sports Plays to Configure Honeypots Environments to form a Virtual Security Shield -- PART 3: CRYPTOGRAPHIC TECHNOLOGIES -- Chapter 12.Security Threats and Solutions for Two Dimensional Barcodes: A Comparative Study -- Chapter 13. Searching Encrypted Data on the Cloud -- Chapter 14. A Strong Single Sign on User Authentication Scheme without Verifier Table for Cloud Based Services -- Chapter 15.Review of the Main Security Threats and Challenges in Free-Access Public Cloud Storage Servers -- Chapter 16.Secure elliptic curves in Cryptography -- Chapter 17.Network models for malware propagation in Wireless Sensor Networks: An Analysis -- PART 4: BIOMETRICS AND FORENSICS -- Chapter 18. Biometric Systems for User Authentication -- Chapter 19. Biometric Authentication and Data Security in Cloud Computing -- Chapter 20. Approximate Search in Digital Forensics -- Chapter 21.Privacy Preserving Internet Browsers -- Forensic Analysis -- Part v. HARDWARE SECURITY -- Chapter 22. Experimental Digital Forensics of SubscriberIdentification Module (SIM) Card -- Chapter 23. A Dynamic Area-Efficient Technique to Enhance ROPUFs Security against Modeling Attacks -- Chapter 24. Physical Unclonable Functions (PUFs) Design Technologies: Advantages and Trade Offs -- PART 6. SECURITY APPLICATIONS -- Chapter 25. Generic Semantics Specification and Processing for Inter-System Information Flow Tracking -- Chapter 26. On Inferring and Characterizing Large-Scale Probing and DDoS Campaigns -- Chapter 27.Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment -- PART 7: SECURITY MANAGEMENT -- Chapter 28. Securing the Internet of Things: Best Practices for Deploying IoT Devices -- Chapter 29. Cognitive Computing and Multiscale Analysis for Cyber Security -- Chapter 30. A Comparative Study of Neural Network Training Algorithms for the Intelligent Security Monitoring of Industrial Control Systems -- Chapter 31. Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts -- Chapter 32. A Survey and Comparison of Performance Evaluation in Intrusion Detection Systems -- Chapter 33. Accountability for Federated Clouds -- Chapter 34. A Cognitive and Concurrent Cyber Kill Chain Model -- Chapter 35.Defense Methods Against Social Engineering Attacks.
|
520 |
|
|
|a This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references at the end of each chapters.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Computer system failures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
2 |
|a Engineering
|
650 |
|
2 |
|a Computer Communication Networks
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Ingénierie.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Pannes système (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Génie électrique.
|
650 |
|
7 |
|a engineering.
|2 aat
|
650 |
|
7 |
|a electrical engineering.
|2 aat
|
650 |
|
7 |
|a Network hardware.
|2 bicssc
|
650 |
|
7 |
|a Systems analysis & design.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Communications engineering
|x telecommunications.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer system failures
|2 fast
|
650 |
|
7 |
|a Electrical engineering
|2 fast
|
650 |
|
7 |
|a Engineering
|2 fast
|
700 |
1 |
|
|a Daimi, Kevin,
|e editor.
|
758 |
|
|
|i has work:
|a Computer and network security essentials (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGkwmjvPhHxvDpbhmRd6Dq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Computer and network security essentials.
|d Cham : Springer International Publishing [2018]
|z 9783319584232
|w (OCoLC)982651328
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4947026
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4947026
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1574210
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14750199
|
994 |
|
|
|a 92
|b IZTAP
|