Security and privacy management, tec...
Maleh, Yassine, (1987-)

 

  • Security and privacy management, techniques, and protocols[electronic resource] /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    杜威分類號: 005.8
    書名/作者: Security and privacy management, techniques, and protocols/ Yassine Maleh, editor.
    其他作者: Maleh, Yassine,
    出版者: Hershey, Pennsylvania : : IGI Global,, [2018]
    面頁冊數: 1 online resource (xxi, 426 p.)
    標題: Computer networks - Security measures.
    標題: Privacy, Right of.
    ISBN: 9781522555841 (ebook)
    ISBN: 9781522555834 (hardcover)
    書目註: Includes bibliographical references and index.
    內容註: Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
    摘要、提要註: "This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
Export
取書館別
 
 
變更密碼
登入