000 | 02365nam a2200229 a 4500 | ||
---|---|---|---|
005 | 20170327093854.0 | ||
008 | 161118s2015 xxuad||| |||| 001 0 eng d | ||
020 | _a9781466665835 (hardcover) | ||
041 | 0 | _aeng | |
082 | 0 | 4 |
_221 _a005.8 _bA316 2015 |
100 | 1 |
_920604 _aAl-Hamami, Alaa Hussein |
|
245 | 1 | 0 |
_aHandbook of research on threat detection and countermeasures in Network Security / _cAlaa Hussein Al-Hamami, Ghossoon M. Waleed al-Saadoon. |
260 |
_aHershey PA : _bIGI Global, _c2015. |
||
300 |
_axxiv, 426 p. : _bil., gráficas ; _c29 cm. |
||
490 | 1 | _aAdvances in information security, privacy, and ethics (AISPE) | |
505 | 0 | _a1. Security concepts, developments, and future trends -- 2. Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection -- 3. Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat -- 4. Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites -- 5. Authentication model for enterprise resource planning network -- 6. Cryptographic hash function: a high level view / -- 7. Crime profiling system -- 8. Proposals to win the battle against cyber crime -- 9. Cyber crimes: types, sizes, defence mechanism, and risk mitigation -- 10. Cyber space security assessment case study -- 11. Biometric security – 12. Data hiding schemes based on singular value decomposition – 13. Malay language text-based anti-spam system using neural network – 14. Virtualization technology and security challenges – 15. The impact of big data on -- 16- Directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback -- 17. A new approach in cloud computing user authentication – 18. Trust determination in wireless ad hoc networks -- 19. Security in mobile computing – 20. The security impacts on social media platforms – 21. Security in digital images: from information hiding perspective. | |
650 | 1 | 4 |
_920788 _aComputer networks _xSecurity measures |
650 | 1 | 4 |
_920789 _aAuthentication techniques |
700 |
_920790 _aWaleed al-Saadoon, Ghossoon M. |
||
830 |
_920791 _aAdvances in information security, privacy, and ethics (AISPE) |
||
942 |
_2ddc _cBK _h005.8 _iA316 2015 _01 |
||
999 |
_c61851 _d61851 |