Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The "essence" of network security = ...
~
Chakraborty, Mohuya.
Linked to FindBook
Google Book
Amazon
博客來
The "essence" of network security = an end-to-end panorama /
Record Type:
Electronic resources : Monograph/item
Title/Author:
The "essence" of network security/ edited by Mohuya Chakraborty ... [et al.].
Reminder of title:
an end-to-end panorama /
other author:
Chakraborty, Mohuya.
Published:
Singapore :Springer Singapore : : 2021.,
Description:
xxxv, 289 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
Contained By:
Springer Nature eBook
Subject:
Computer networks - Security measures. -
Online resource:
https://doi.org/10.1007/978-981-15-9317-8
ISBN:
9789811593178
The "essence" of network security = an end-to-end panorama /
The "essence" of network security
an end-to-end panorama /[electronic resource] :edited by Mohuya Chakraborty ... [et al.]. - Singapore :Springer Singapore :2021. - xxxv, 289 p. :ill., digital ;24 cm. - Lecture notes in networks and systems,v.1632367-3370 ;. - Lecture notes in networks and systems ;v.163..
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks.
ISBN: 9789811593178
Standard No.: 10.1007/978-981-15-9317-8doiSubjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .E77 2021
Dewey Class. No.: 005.8
The "essence" of network security = an end-to-end panorama /
LDR
:02933nmm a2200337 a 4500
001
2236401
003
DE-He213
005
20201124071123.0
006
m d
007
cr nn 008maaau
008
211111s2021 si s 0 eng d
020
$a
9789811593178
$q
(electronic bk.)
020
$a
9789811593161
$q
(paper)
024
7
$a
10.1007/978-981-15-9317-8
$2
doi
035
$a
978-981-15-9317-8
040
$a
GP
$c
GP
$e
rda
041
0
$a
eng
050
4
$a
TK5105.59
$b
.E77 2021
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.E78 2021
245
0 4
$a
The "essence" of network security
$h
[electronic resource] :
$b
an end-to-end panorama /
$c
edited by Mohuya Chakraborty ... [et al.].
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2021.
300
$a
xxxv, 289 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in networks and systems,
$x
2367-3370 ;
$v
v.163
505
0
$a
Introduction to Network Security Technologies -- A Systematic Review of Digital, Cloud and IoT Forensics -- Blockchain Based Framework for Managing Customer Consent in Open Banking -- A Comprehensive Study of Pros and Cons on Implementation of Block-chain for IoT device Security -- Role of Cryptography in Network Security -- Detection of Malicious URLs using Deep Learning Approach -- Software Defined Network Vulnerabilities -- Demystifying Security on NDN: A survey of Existing Attacks and Open Research Challenges -- Anonymous Traffic Network.
520
$a
This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies. This is a great book on network security, which has lucid and well-planned chapters. All the latest security technologies are thoroughly explained with upcoming research issues. Details on Internet architecture, security needs, encryption, cryptography along with the usages of machine learning and artificial intelligence for network security are presented in a single cover. The broad-ranging text/reference comprehensively surveys network security concepts, methods, and practices and covers network security policies and goals in an integrated manner. It is an essential security resource for practitioners in networks and professionals who develop and maintain secure computer networks.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Electrical engineering.
$3
649834
650
0
$a
Machine learning.
$3
533906
650
0
$a
Computer engineering.
$3
621879
650
0
$a
Internet of things.
$3
2057703
650
0
$a
Embedded computer systems.
$3
582088
650
0
$a
Big data.
$3
2045508
650
1 4
$a
Communications Engineering, Networks.
$3
891094
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Cyber-physical systems, IoT.
$3
3386699
650
2 4
$a
Big Data.
$3
3134868
700
1
$a
Chakraborty, Mohuya.
$3
3380012
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in networks and systems ;
$v
v.163.
$3
3487766
856
4 0
$u
https://doi.org/10.1007/978-981-15-9317-8
950
$a
Engineering (SpringerNature-11647)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9398286
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .E77 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login