語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Architectures and protocols for secu...
~
Martinez, Antonio Ruiz, (1976-)
FindBook
Google Book
Amazon
博客來
Architectures and protocols for secure information technology infrastructures /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Architectures and protocols for secure information technology infrastructures // Antonio Ruiz Martinez, Rafael Marin-Lopez and Fernando Pereniguez Garcia, editors.
其他作者:
Martinez, Antonio Ruiz,
面頁冊數:
PDFs (365 pages) :illustrations.
內容註:
Security and privacy issues in cloud computing / Jaydip Sen -- Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluis Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme / Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Host-based intrusion detection systems: architectures, solutions, and challenges / Vit Bukac, Vashek Matyaš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru -- A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarin, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sanchez, Robert Kuykendall.
標題:
Information technology - Security measures. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4514-1
ISBN:
9781466645158 (ebook)
Architectures and protocols for secure information technology infrastructures /
Architectures and protocols for secure information technology infrastructures /
Antonio Ruiz Martinez, Rafael Marin-Lopez and Fernando Pereniguez Garcia, editors. - PDFs (365 pages) :illustrations.
Includes bibliographical references.
Security and privacy issues in cloud computing / Jaydip Sen -- Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluis Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme / Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Host-based intrusion detection systems: architectures, solutions, and challenges / Vit Bukac, Vashek Matyaš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru -- A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarin, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sanchez, Robert Kuykendall.
Restricted to subscribers or individual electronic text purchasers.
"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781466645158 (ebook)
Standard No.: 10.4018/978-1-4666-4514-1doi
LCCN: 2013020692Subjects--Topical Terms:
590547
Information technology
--Security measures.Subjects--Index Terms:
Access control
LC Class. No.: QA76.9.A25 / A73 2014e
Dewey Class. No.: 005.8
Architectures and protocols for secure information technology infrastructures /
LDR
:03750nmm a2200469 i 4500
001
2000079
003
IGIG
005
20130917124129.0
008
151126s2014 paua fob 000 0 eng d
010
$a
2013020692
020
$a
9781466645158 (ebook)
020
$a
9781466645141 (hardcover)
020
$a
9781466645165 (print & perpetual access)
024
7
$a
10.4018/978-1-4666-4514-1
$2
doi
035
$a
(CaBNVSL)gtp00556790
035
$a
(OCoLC)855019703
035
$a
00000212
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
QA76.9.A25
$b
A73 2014e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Architectures and protocols for secure information technology infrastructures /
$c
Antonio Ruiz Martinez, Rafael Marin-Lopez and Fernando Pereniguez Garcia, editors.
264
1
$a
Hershey, Pennsylvania (701 E. Chocolate Ave., Hershey, PA, 17033) :
$b
IGI Global,
$c
[2014]
300
$a
PDFs (365 pages) :
$b
illustrations.
336
$a
text
$2
rdacontent
337
$a
electronic
$2
isbdmedia
338
$a
online resource
$2
rdacarrier
504
$a
Includes bibliographical references.
505
0
$a
Security and privacy issues in cloud computing / Jaydip Sen -- Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluis Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme / Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Host-based intrusion detection systems: architectures, solutions, and challenges / Vit Bukac, Vashek Matyaš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru -- A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarin, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sanchez, Robert Kuykendall.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
650
0
$a
Information technology
$x
Security measures.
$3
590547
650
0
$a
Computer networks
$x
Security measures.
$3
579161
653
$a
Access control
653
$a
Anonymous communications and services
653
$a
Content distribution
653
$a
Mobile/Embedded systems
653
$a
RFID
653
$a
Secure protocols
653
$a
Security architectures
653
$a
Security modeling and vulnerability analysis
700
1
$a
Martinez, Antonio Ruiz,
$d
1976-
$e
editor.
$3
2143209
700
1
$a
Marin-Lopez, Rafael,
$d
1977-
$e
editor.
$3
2143210
700
1
$a
Garcia, Fernando Pereniguez,
$d
1984-
$e
editor.
$3
2143211
710
2
$a
IGI Global.
$3
1361470
776
0
$c
(Original)
$w
(DLC)2013020692
776
0 8
$i
Print version:
$z
1466645148
$z
9781466645141
$w
(DLC) 2013020692
856
4 1
$3
Chapter PDFs via platform:
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4514-1
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9269441
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 A73 2014e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入