Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy management, tec...
~
Maleh, Yassine, (1987-)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy management, techniques, and protocols
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy management, techniques, and protocols/ Yassine Maleh, editor.
other author:
Maleh, Yassine,
Published:
Hershey, Pennsylvania :IGI Global, : [2018],
Description:
1 online resource (xxi, 426 p.)
[NT 15003449]:
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
Subject:
Computer networks - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
ISBN:
9781522555841 (ebook)
Security and privacy management, techniques, and protocols
Security and privacy management, techniques, and protocols
[electronic resource] /Yassine Maleh, editor. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (xxi, 426 p.)
Includes bibliographical references and index.
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
Restricted to subscribers or individual electronic text purchasers.
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
ISBN: 9781522555841 (ebook)Subjects--Topical Terms:
579161
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .S439235 2018e
Dewey Class. No.: 005.8
Security and privacy management, techniques, and protocols
LDR
:03020nmm a2200277 a 4500
001
2137969
003
IGIG
005
20181030154020.0
006
m o d
007
cr cn
008
181117s2018 pau fob 001 0 eng d
010
$z
2017048268
020
$a
9781522555841 (ebook)
020
$a
9781522555834 (hardcover)
035
$a
(OCoLC)1028726766
035
$a
1071025340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.S439235 2018e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Security and privacy management, techniques, and protocols
$h
[electronic resource] /
$c
Yassine Maleh, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (xxi, 426 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Privacy, Right of.
$3
606607
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
3311014
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9344663
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .S439235 2018e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login