|
|
|
|
LEADER |
00000cam a22000001i 4500 |
001 |
OR_on1125077585 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m d |
007 |
cr ||||||||||| |
008 |
140911s2014 flua o 001 0 eng d |
040 |
|
|
|a UKMGB
|b eng
|e rda
|e pn
|c UKMGB
|d OCLCO
|d OCLCF
|d OCLCO
|d UAB
|
015 |
|
|
|a GBB4A2919
|2 bnb
|
016 |
7 |
|
|a 016873804
|2 Uk
|
020 |
|
|
|a 9781482207071
|q (PDF ebook) :
|
020 |
|
|
|a 1482207079
|
020 |
|
|
|z 9781482207064 (hbk.)
|
029 |
0 |
|
|a UKMGB
|b 016873804
|
035 |
|
|
|a (OCoLC)1125077585
|
037 |
|
|
|a TANDF_324896
|b Ingram Content Group
|
050 |
|
4 |
|a Internet Access
|b AEU
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Case studies in secure computing :
|b achievements and trends /
|c edited by Biju Issac and Nauman Israr.
|
250 |
|
|
|a 1st.
|
264 |
|
1 |
|a Boca Raton :
|b Auerbach,
|c 2014.
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white).
|
336 |
|
|
|a text
|2 rdacontent
|
336 |
|
|
|a still image
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a <P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection and Decision Tree: A Combinational Approach for Intrusion Detection; <EM>Hari Om and Alok Kumar Gupta<BR></EM>Fuzzy Logic-Based Application Security Risk Assessment; <EM>Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya<BR></EM>Authenticated Multiple-Key Establishment Protocol for Wireless Sensor Networks; <EM>Jayaprakash Kar<BR></EM>Tees Confidentiality Model (TCM2): Supporting Dynamic Authorization and Overrides in Attribute Based Access Control; <EM>Jim Longstaff and Tony Howitt<BR></EM>Design and Analysis of Independent, Open-Access Wi-Fi Monitoring Infrastructures in Live Environments; <EM>Jonny Milliken, Kian Meng Yap, and Alan Marshall<BR></EM>Security Attacks and Countermeasures in Cloud Computing; <EM>Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan<BR></EM>Optimizing Ant-Based Internet Protocol Traceback; <EM>Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi<BR></EM>A Case Study on Security Issues in LT E Backhaul and Core Networks; <EM>Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov<BR></EM>A Case Study of Intelligent ID S False Alarm Reduction in Cloud Environments: Challenges and Trends; <EM>Yuxin Meng, We njuan Li, and Lam-For Kwok<BR></EM>Attacks in Wireless Sensor Networks and Their Countermeasures; <EM>Mukesh Kumar and Kamlesh Dutta<BR></EM>Privacy-Preserving Identity-Based Broadcast Encryption and Its Applications; <EM>Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal<BR></EM>The Impact of Application-Layer Denial-of-Service Attacks; <EM>Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani<BR></EM>Classification of Radical Messages on Twitter Using Security Associations; <EM>Pooja Wadhwa and M. P. S. Bhatia<BR></EM>Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the L<I>p </I>Metric; <EM>Renato Cordeirode Amorim and Peter Komisarczuk<BR></EM>Reversible Watermarking: Theory and Practice; <EM>Ruchira Naskar and Rajat Subhra Chakraborty<BR></EM>Web Application Security Attacks and Countermeasures; <EM>Tushar Kanti Saha and A. B. M. Shawkat Ali<BR></EM>Security in Mobile Networks: A Novel Challenge and Solution; <EM>Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz<BR></EM>Web Session Security: Attack and Defense Techniques; <EM>Zachary Evans and Hossain Shahriar<BR></EM>Internet Botnets: A Survey of Detection Techniques; <EM>Boris Nechaev and Andrei Gurtov<BR></EM>Creating a Solid Information Security Infrastructure through the Use of the Intelligence Cycle: A Case Study; <EM>Carlos F. Lerma Reséndez<BR></EM>A Novel Construction of Certificateless Signcryption Scheme for Smart Card; <EM>Jayaprakash Kar</P></EM>
|
588 |
|
|
|a Description based on CIP data; item not viewed.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|v Case studies.
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Case studies.
|
650 |
|
6 |
|a Sécurité informatique
|v Études de cas.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures
|v Études de cas.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
7 |
|a Case studies.
|2 fast
|0 (OCoLC)fst01423765
|
700 |
1 |
|
|a Issac, Biju,
|e editor.
|
700 |
1 |
|
|a Israr, Nauman,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|z 9781482207064
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781482207064/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|