Cargando…

Case studies in secure computing : achievements and trends /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Issac, Biju (Editor ), Israr, Nauman (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach, 2014.
Edición:1st.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000001i 4500
001 OR_on1125077585
003 OCoLC
005 20231017213018.0
006 m d
007 cr |||||||||||
008 140911s2014 flua o 001 0 eng d
040 |a UKMGB  |b eng  |e rda  |e pn  |c UKMGB  |d OCLCO  |d OCLCF  |d OCLCO  |d UAB 
015 |a GBB4A2919  |2 bnb 
016 7 |a 016873804  |2 Uk 
020 |a 9781482207071  |q (PDF ebook) : 
020 |a 1482207079 
020 |z 9781482207064 (hbk.) 
029 0 |a UKMGB  |b 016873804 
035 |a (OCoLC)1125077585 
037 |a TANDF_324896  |b Ingram Content Group 
050 4 |a Internet Access  |b AEU 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Case studies in secure computing :  |b achievements and trends /  |c edited by Biju Issac and Nauman Israr. 
250 |a 1st. 
264 1 |a Boca Raton :  |b Auerbach,  |c 2014. 
300 |a 1 online resource :  |b illustrations (black and white). 
336 |a text  |2 rdacontent 
336 |a still image  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a <P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; <EM>Hari Om and Alok Kumar Gupta<BR></EM>Fuzzy Logic-Based Application Security Risk Assessment; <EM>Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya<BR></EM>Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; <EM>Jayaprakash Kar<BR></EM>Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; <EM>Jim Longstaff and Tony Howitt<BR></EM>Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; <EM>Jonny Milliken, Kian Meng Yap, and Alan Marshall<BR></EM>Security Attacks and Countermeasures in Cloud Computing; <EM>Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan<BR></EM>Optimizing Ant-Based Internet Protocol Traceback; <EM>Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi<BR></EM>A Case Study on Security Issues in LT E Backhaul and Core Networks; <EM>Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov<BR></EM>A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; <EM>Yuxin Meng, We njuan Li, and Lam-For Kwok<BR></EM>Attacks in Wireless Sensor Networks and Their Countermeasures; <EM>Mukesh Kumar and Kamlesh Dutta<BR></EM>Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; <EM>Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal<BR></EM>The Impact of Application-Layer Denial-of-Service Attacks; <EM>Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani<BR></EM>Classification of Radical Messages on Twitter Using Security Associations; <EM>Pooja Wadhwa and M. P. S. Bhatia<BR></EM>Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the L<I>p </I>Metric; <EM>Renato Cordeirode Amorim and Peter Komisarczuk<BR></EM>Reversible Watermarking: Theory and Practice; <EM>Ruchira Naskar and Rajat Subhra Chakraborty<BR></EM>Web Application Security Attacks and Countermeasures; <EM>Tushar Kanti Saha and A. B. M. Shawkat Ali<BR></EM>Security in Mobile Networks: A Novel Challenge and Solution; <EM>Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz<BR></EM>Web Session Security: Attack and Defense Techniques; <EM>Zachary Evans and Hossain Shahriar<BR></EM>Internet Botnets: A Survey of Detection Techniques; <EM>Boris Nechaev and Andrei Gurtov<BR></EM>Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study; <EM>Carlos F. Lerma Reséndez<BR></EM>A Novel Construction of Certificateless Signcryption Scheme for Smart Card; <EM>Jayaprakash Kar</P></EM> 
588 |a Description based on CIP data; item not viewed. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security  |v Case studies. 
650 0 |a Computer networks  |x Security measures  |v Case studies. 
650 6 |a Sécurité informatique  |v Études de cas. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Études de cas. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
655 7 |a Case studies.  |2 fast  |0 (OCoLC)fst01423765 
700 1 |a Issac, Biju,  |e editor. 
700 1 |a Israr, Nauman,  |e editor. 
776 0 8 |i Print version:  |z 9781482207064 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781482207064/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP