語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The "essence" of network security = ...
~
Chakraborty, Mohuya.
FindBook
Google Book
Amazon
博客來
The "essence" of network security = an end-to-end panorama /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The "essence" of network security/ edited by Mohuya Chakraborty ... [et al.].
其他題名:
an end-to-end panorama /
其他作者:
Chakraborty, Mohuya.
出版者:
Singapore :Springer Singapore : : 2021.,
面頁冊數:
xxxv, 289 p. :ill., digital ;24 cm.
內容註:
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-981-15-9317-8
ISBN:
9789811593178
The "essence" of network security = an end-to-end panorama /
The "essence" of network security
an end-to-end panorama /[electronic resource] :edited by Mohuya Chakraborty ... [et al.]. - Singapore :Springer Singapore :2021. - xxxv, 289 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v.1632367-3370 ;. - Lecture notes in networks and systems ;v.163..
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks.
ISBN: 9789811593178
Standard No.: 10.1007/978-981-15-9317-8doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .E77 2021
Dewey Class. No.: 005.8
The "essence" of network security = an end-to-end panorama /
LDR
:02933nmm a2200337 a 4500
001
2236401
003
DE-He213
005
20201124071123.0
006
m d
007
cr nn 008maaau
008
211111s2021 si s 0 eng d
020
$a
9789811593178
$q
(electronic bk.)
020
$a
9789811593161
$q
(paper)
024
7
$a
10.1007/978-981-15-9317-8
$2
doi
035
$a
978-981-15-9317-8
040
$a
GP
$c
GP
$e
rda
041
0
$a
eng
050
4
$a
TK5105.59
$b
.E77 2021
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.E78 2021
245
0 4
$a
The "essence" of network security
$h
[electronic resource] :
$b
an end-to-end panorama /
$c
edited by Mohuya Chakraborty ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xxxv, 289 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3370 ;
$v
v.163
505
0
$a
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
520
$a
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Electrical engineering.
$3
649834
650
0
$a
Machine learning.
$3
533906
650
0
$a
Computer engineering.
$3
621879
650
0
$a
Internet of things.
$3
2057703
650
0
$a
Embedded computer systems.
$3
582088
650
0
$a
Big data.
$3
2045508
650
1 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Cyber-physical systems, IoT.
$3
3386699
650
2 4
$a
Big Data.
$3
3134868
700
1
$a
Chakraborty, Mohuya.
$3
3380012
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.163.
$3
3487766
856
4 0
$u
https://doi.org/10.1007/978-981-15-9317-8
950
$a
Engineering (SpringerNature-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9398286
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .E77 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入