Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy management, tec...
~
Maleh, Yassine, (1987-)
Security and privacy management, techniques, and protocols
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy management, techniques, and protocolsYassine Maleh, editor.
other author:
Maleh, Yassine,
Published:
Hershey, Pennsylvania :IGI Global,[2018]
Description:
1 online resource (xxi, 426 p.)
Subject:
Computer networksSecurity measures.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
ISBN:
9781522555841 (ebook)
Security and privacy management, techniques, and protocols
Security and privacy management, techniques, and protocols
[electronic resource] /Yassine Maleh, editor. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (xxi, 426 p.)
Includes bibliographical references and index.
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
Restricted to subscribers or individual electronic text purchasers.
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
ISBN: 9781522555841 (ebook)Subjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59 / .S439235 2018e
Dewey Class. No.: 005.8
Security and privacy management, techniques, and protocols
LDR
:03020nmm a2200277 a 4500
001
532808
003
IGIG
005
20181030154020.0
006
m o d
007
cr cn
008
181116s2018 pau fob 001 0 eng d
010
$z
2017048268
020
$a
9781522555841 (ebook)
020
$a
9781522555834 (hardcover)
035
$a
(OCoLC)1028726766
035
$a
1071025340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.S439235 2018e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Security and privacy management, techniques, and protocols
$h
[electronic resource] /
$c
Yassine Maleh, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (xxi, 426 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
$c
Provided by publisher.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Privacy, Right of.
$3
206659
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
808059
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000153625
電子館藏
1圖書
電子書
EB TK5105.59 S439235 2018
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login