語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on modern crypt...
~
Gupta, Brij, (1982-)
FindBook
Google Book
Amazon
博客來
Handbook of research on modern cryptographic solutions for computer and cyber security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Handbook of research on modern cryptographic solutions for computer and cyber security/ Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
其他作者:
Gupta, Brij,
出版者:
Hershey, Pennsylvania :IGI Global, : [2016],
面頁冊數:
1 online resource (589 p.) :ill.
內容註:
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
內容註:
Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.
標題:
Data encryption (Computer science) -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
ISBN:
9781522501060 (ebk.)
Handbook of research on modern cryptographic solutions for computer and cyber security
Handbook of research on modern cryptographic solutions for computer and cyber security
[electronic resource] /Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. - Hershey, Pennsylvania :IGI Global,[2016] - 1 online resource (589 p.) :ill.
Includes bibliographical references and index.
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
Restricted to subscribers or individual electronic text purchasers.
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522501060 (ebk.)Subjects--Topical Terms:
579162
Data encryption (Computer science)
Subjects--Index Terms:
Ad hoc network security
LC Class. No.: QA76.9.A25 / H364 2016e
Dewey Class. No.: 005.8/2
Handbook of research on modern cryptographic solutions for computer and cyber security
LDR
:04187nmm a2200433 i 4500
001
2095153
003
IGIG
005
19991101153922.0
006
m eo d
007
cr bn |||m|||a
008
171207s2016 paua fob 001 0 eng d
010
$z
2016002930
020
$a
9781522501060 (ebk.)
020
$a
9781522501053 (hbk.)
035
$a
(CaBNVSL)gtp00565763
035
$a
(OCoLC)950680427
035
$a
0000000293
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
H364 2016e
082
0 0
$a
005.8/2
$2
23
245
0 0
$a
Handbook of research on modern cryptographic solutions for computer and cyber security
$h
[electronic resource] /
$c
Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2016]
300
$a
1 online resource (589 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
505
8
$a
Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 05/20/2016).
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Cyberterrorism.
$3
781846
650
0
$a
Cyberterrorism
$x
Prevention.
$3
819287
650
0
$a
Computer security
$x
Government policy.
$3
998158
653
$a
Ad hoc network security
653
$a
Botnet detection
653
$a
Cyber crime
653
$a
Cyber warfare
653
$a
Defense techniques
653
$a
Forensic tools
653
$a
Visual analytics
653
$a
Wireless security
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
3231537
700
1
$a
Agrawal, Dharma P.
$q
(Dharma Prakash),
$d
1945-
$e
editor.
$3
3231538
700
1
$a
Yamaguchi, Shingo,
$d
1969-
$e
editor.
$3
3231539
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9317963
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 H364 2016e
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入