語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network security technologies : = de...
~
Amine, Abdelmalek,
FindBook
Google Book
Amazon
博客來
Network security technologies : = design and applications /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Network security technologies :/ Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, editors.
其他題名:
design and applications /
其他作者:
Amine, Abdelmalek,
出版者:
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :IGI Global, : [2014],
面頁冊數:
1 online resource (330 pages) :ill.
內容註:
Review of security in VANETs and MANETs / Mai Abu Baqar, Hamza Aldabbas, Tariq Alwadan, Mai Alfawair, Helge Janicke -- Trends in crime toolkit development / Ansam Khraisat, Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ahmad Azab -- Synthesis of supervised approaches for intrusion detection systems / Ahmed Chaouki Lokbani, Ahmed Lehireche, Reda Mohamed Hamou, Abdelmalek Amine -- Applying game theory in securing wireless sensor networks by minimizing battery usage / Mehran Asadi, Afrand Agah, Christopher Zimmerman -- Short-hops vs. long-hops: energy-efficiency analysis in wireless sensor networks / Mekkaoui Kheireddine, Rahmoun Abdellatif -- HTTPV: verifiable HTTP across an untrusted channel / Subrata Acharya -- Amelioration of anonymity modus operandi for privacy preserving data publishing / J. Indumathi -- Web service security: authentication and authorization technologies / Elena M. Torroglosa Garcia, Gabriel Lopez Millan -- Identity-based encryption protocol for privacy and authentication in wireless networks / Clifton Mulkey, Dulal C. Kar -- Distinguishing human users from bots: methods and assessments / M. Hassan Shirali-Shahreza, Sajad Shirali-Shahreza -- Network security: attacks and controls / Natarajan Meghanathan -- Botnets: analysis, detection, and mitigation / Hamad Binsalleeh -- Formal reliability analysis of engineering systems / Naeem Abbasi, Osman Hasan, Sofiene Tahar -- Adaptive intrusion detection systems: the next generation of IDSs / Hassina Bensefia, Nassira Ghoualmi-Zine.
標題:
Computer networks - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4789-3
ISBN:
9781466647909 (ebook)
Network security technologies : = design and applications /
Network security technologies :
design and applications /Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, editors. - Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :IGI Global,[2014] - 1 online resource (330 pages) :ill.
Includes bibliographical references.
Review of security in VANETs and MANETs / Mai Abu Baqar, Hamza Aldabbas, Tariq Alwadan, Mai Alfawair, Helge Janicke -- Trends in crime toolkit development / Ansam Khraisat, Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ahmad Azab -- Synthesis of supervised approaches for intrusion detection systems / Ahmed Chaouki Lokbani, Ahmed Lehireche, Reda Mohamed Hamou, Abdelmalek Amine -- Applying game theory in securing wireless sensor networks by minimizing battery usage / Mehran Asadi, Afrand Agah, Christopher Zimmerman -- Short-hops vs. long-hops: energy-efficiency analysis in wireless sensor networks / Mekkaoui Kheireddine, Rahmoun Abdellatif -- HTTPV: verifiable HTTP across an untrusted channel / Subrata Acharya -- Amelioration of anonymity modus operandi for privacy preserving data publishing / J. Indumathi -- Web service security: authentication and authorization technologies / Elena M. Torroglosa Garcia, Gabriel Lopez Millan -- Identity-based encryption protocol for privacy and authentication in wireless networks / Clifton Mulkey, Dulal C. Kar -- Distinguishing human users from bots: methods and assessments / M. Hassan Shirali-Shahreza, Sajad Shirali-Shahreza -- Network security: attacks and controls / Natarajan Meghanathan -- Botnets: analysis, detection, and mitigation / Hamad Binsalleeh -- Formal reliability analysis of engineering systems / Naeem Abbasi, Osman Hasan, Sofiene Tahar -- Adaptive intrusion detection systems: the next generation of IDSs / Hassina Bensefia, Nassira Ghoualmi-Zine.
Restricted to subscribers or individual electronic text purchasers.
"This book presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466647909 (ebook)
LCCN: 2013040298Subjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .N3434 2014e
Dewey Class. No.: 005.8
Network security technologies : = design and applications /
LDR
:02843nmm a2200277 i 4500
001
1948610
005
19991204150924.0
008
141225s2014 pau fob 000 0 eng d
010
$a
2013040298
020
$a
9781466647909 (ebook)
020
$a
9781466647893 (hbk.)
035
$a
(CaBNVSL)gtp00559318
035
$a
(OCoLC)880631292
035
$a
00000245
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.N3434 2014e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Network security technologies :
$b
design and applications /
$c
Abdelmalek Amine, Otmane Ait Mohamed, and Boualem Benatallah, editors.
260
$a
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :
$b
IGI Global,
$c
[2014]
300
$a
1 online resource (330 pages) :
$b
ill.
504
$a
Includes bibliographical references.
505
0
$a
Review of security in VANETs and MANETs / Mai Abu Baqar, Hamza Aldabbas, Tariq Alwadan, Mai Alfawair, Helge Janicke -- Trends in crime toolkit development / Ansam Khraisat, Ammar Alazab, Michael Hobbs, Jemal H. Abawajy, Ahmad Azab -- Synthesis of supervised approaches for intrusion detection systems / Ahmed Chaouki Lokbani, Ahmed Lehireche, Reda Mohamed Hamou, Abdelmalek Amine -- Applying game theory in securing wireless sensor networks by minimizing battery usage / Mehran Asadi, Afrand Agah, Christopher Zimmerman -- Short-hops vs. long-hops: energy-efficiency analysis in wireless sensor networks / Mekkaoui Kheireddine, Rahmoun Abdellatif -- HTTPV: verifiable HTTP across an untrusted channel / Subrata Acharya -- Amelioration of anonymity modus operandi for privacy preserving data publishing / J. Indumathi -- Web service security: authentication and authorization technologies / Elena M. Torroglosa Garcia, Gabriel Lopez Millan -- Identity-based encryption protocol for privacy and authentication in wireless networks / Clifton Mulkey, Dulal C. Kar -- Distinguishing human users from bots: methods and assessments / M. Hassan Shirali-Shahreza, Sajad Shirali-Shahreza -- Network security: attacks and controls / Natarajan Meghanathan -- Botnets: analysis, detection, and mitigation / Hamad Binsalleeh -- Formal reliability analysis of engineering systems / Naeem Abbasi, Osman Hasan, Sofiene Tahar -- Adaptive intrusion detection systems: the next generation of IDSs / Hassina Bensefia, Nassira Ghoualmi-Zine.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
700
1
$a
Amine, Abdelmalek,
$e
editor.
$3
2074118
700
1
$a
Ait Mohamed, Otmane,
$e
editor.
$3
2074119
700
1
$a
Benatallah, Boualem,
$e
editor.
$3
2074120
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4789-3
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9246819
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .N3434 2014e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入