Security and privacy management, tec...
Maleh, Yassine, (1987-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Security and privacy management, techniques, and protocols
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Security and privacy management, techniques, and protocols/ Yassine Maleh, editor.
    other author: Maleh, Yassine,
    Published: Hershey, Pennsylvania :IGI Global, : [2018],
    Description: 1 online resource (xxi, 426 p.)
    [NT 15003449]: Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
    Subject: Computer networks - Security measures. -
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
    ISBN: 9781522555841 (ebook)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9344663 電子資源 11.線上閱覽_V 電子書 EB TK5105.59 .S439235 2018e 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login