Handbook of research on threat detection and countermeasures in Network Security / Alaa Hussein Al-Hamami, Ghossoon M. Waleed al-Saadoon.

By: Contributor(s): Material type: TextTextLanguage: English Series: Advances in information security, privacy, and ethics (AISPE)Publication details: Hershey PA : IGI Global, 2015. Description: xxiv, 426 p. : il., gráficas ; 29 cmISBN:
  • 9781466665835 (hardcover)
Subject(s): DDC classification:
  • 21 005.8 A316 2015
Contents:
1. Security concepts, developments, and future trends -- 2. Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection -- 3. Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat -- 4. Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites -- 5. Authentication model for enterprise resource planning network -- 6. Cryptographic hash function: a high level view / -- 7. Crime profiling system -- 8. Proposals to win the battle against cyber crime -- 9. Cyber crimes: types, sizes, defence mechanism, and risk mitigation -- 10. Cyber space security assessment case study -- 11. Biometric security – 12. Data hiding schemes based on singular value decomposition – 13. Malay language text-based anti-spam system using neural network – 14. Virtualization technology and security challenges – 15. The impact of big data on -- 16- Directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback -- 17. A new approach in cloud computing user authentication – 18. Trust determination in wireless ad hoc networks -- 19. Security in mobile computing – 20. The security impacts on social media platforms – 21. Security in digital images: from information hiding perspective.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Materials specified Copy number Status Notes Date due Barcode
Libro de Reserva Libro de Reserva Biblioteca William Corredor Gómez. Sede Cosmos (Barranquilla) Reserva 005.8 A316 2015 (Browse shelf(Opens below)) Ej. 1 Available Colección 1, Isla 1, Lado B, Módulo 3 301254179

1. Security concepts, developments, and future trends -- 2. Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection -- 3. Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat -- 4. Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites -- 5. Authentication model for enterprise resource planning network -- 6. Cryptographic hash function: a high level view / -- 7. Crime profiling system -- 8. Proposals to win the battle against cyber crime -- 9. Cyber crimes: types, sizes, defence mechanism, and risk mitigation -- 10. Cyber space security assessment case study -- 11. Biometric security – 12. Data hiding schemes based on singular value decomposition – 13. Malay language text-based anti-spam system using neural network – 14. Virtualization technology and security challenges – 15. The impact of big data on -- 16- Directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback -- 17. A new approach in cloud computing user authentication – 18. Trust determination in wireless ad hoc networks -- 19. Security in mobile computing – 20. The security impacts on social media platforms – 21. Security in digital images: from information hiding perspective.

There are no comments on this title.

to post a comment.