Handbook of research on threat detection and countermeasures in Network Security / Alaa Hussein Al-Hamami, Ghossoon M. Waleed al-Saadoon.
Material type: TextLanguage: English Series: Advances in information security, privacy, and ethics (AISPE)Publication details: Hershey PA : IGI Global, 2015. Description: xxiv, 426 p. : il., gráficas ; 29 cmISBN:- 9781466665835 (hardcover)
- 21 005.8 A316 2015
Item type | Current library | Collection | Call number | Materials specified | Copy number | Status | Notes | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|---|
Libro de Reserva | Biblioteca William Corredor Gómez. Sede Cosmos (Barranquilla) | Reserva | 005.8 A316 2015 (Browse shelf(Opens below)) | Ej. 1 | Available | Colección 1, Isla 1, Lado B, Módulo 3 | 301254179 |
1. Security concepts, developments, and future trends -- 2. Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection -- 3. Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat -- 4. Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites -- 5. Authentication model for enterprise resource planning network -- 6. Cryptographic hash function: a high level view / -- 7. Crime profiling system -- 8. Proposals to win the battle against cyber crime -- 9. Cyber crimes: types, sizes, defence mechanism, and risk mitigation -- 10. Cyber space security assessment case study -- 11. Biometric security – 12. Data hiding schemes based on singular value decomposition – 13. Malay language text-based anti-spam system using neural network – 14. Virtualization technology and security challenges – 15. The impact of big data on -- 16- Directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback -- 17. A new approach in cloud computing user authentication – 18. Trust determination in wireless ad hoc networks -- 19. Security in mobile computing – 20. The security impacts on social media platforms – 21. Security in digital images: from information hiding perspective.
There are no comments on this title.