語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on modern crypt...
~
Agrawal, Dharma P. (1945-)
Handbook of research on modern cryptographic solutions for computer and cyber security[electronic resource] /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.8/2
書名/作者:
Handbook of research on modern cryptographic solutions for computer and cyber security/ Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
其他作者:
Gupta, Brij,
出版者:
Hershey, Pennsylvania : : IGI Global,, [2016]
面頁冊數:
1 online resource (589 p.) : : ill.
標題:
Data encryption (Computer science)
標題:
Cyberterrorism.
標題:
Cyberterrorism - Prevention.
標題:
Computer security - Government policy.
ISBN:
9781522501060 (ebk.)
ISBN:
9781522501053 (hbk.)
書目註:
Includes bibliographical references and index.
內容註:
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
摘要、提要註:
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
Handbook of research on modern cryptographic solutions for computer and cyber security[electronic resource] /
Handbook of research on modern cryptographic solutions for computer and cyber security
[electronic resource] /Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. - Hershey, Pennsylvania :IGI Global,[2016] - 1 online resource (589 p.) :ill.
Includes bibliographical references and index.
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
Restricted to subscribers or individual electronic text purchasers.
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522501060 (ebk.)Subjects--Topical Terms:
369827
Data encryption (Computer science)
Subjects--Index Terms:
Ad hoc network security
LC Class. No.: QA76.9.A25 / H364 2016e
Dewey Class. No.: 005.8/2
Handbook of research on modern cryptographic solutions for computer and cyber security[electronic resource] /
LDR
:04187nam a2200433 i 4500
001
478330
003
IGIG
005
19991101153922.0
006
m eo d
007
cr bn |||m|||a
008
181208s2016 paua fob 001 0 eng d
010
$z
2016002930
020
$a
9781522501060 (ebk.)
020
$a
9781522501053 (hbk.)
035
$a
(CaBNVSL)gtp00565763
035
$a
(OCoLC)950680427
035
$a
0000000293
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
H364 2016e
082
0 0
$a
005.8/2
$2
23
245
0 0
$a
Handbook of research on modern cryptographic solutions for computer and cyber security
$h
[electronic resource] /
$c
Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2016]
300
$a
1 online resource (589 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
505
8
$a
Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 05/20/2016).
650
0
$a
Data encryption (Computer science)
$3
369827
650
0
$a
Cyberterrorism.
$3
386219
650
0
$a
Cyberterrorism
$x
Prevention.
$3
542490
650
0
$a
Computer security
$x
Government policy.
$3
666435
653
$a
Ad hoc network security
653
$a
Botnet detection
653
$a
Cyber crime
653
$a
Cyber warfare
653
$a
Defense techniques
653
$a
Forensic tools
653
$a
Visual analytics
653
$a
Wireless security
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
690522
700
1
$a
Agrawal, Dharma P.
$q
(Dharma Prakash),
$d
1945-
$3
412525
700
1
$a
Yamaguchi, Shingo,
$d
1969-
$e
editor.
$3
690523
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入