Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Information security in diverse comp...
~
Kayem, Anne, (1975-)
Information security in diverse computing environments
Record Type:
Electronic resources : Monograph/item
Title/Author:
Information security in diverse computing environmentsAnne Kayem and Christoph Meinel, editors.
other author:
Kayem, Anne,
Published:
Hershey, Pennsylvania :IGI Global,[2014]
Description:
1 online resource (xxiv, 354 p.)
Subject:
Computer security.
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
ISBN:
9781466661592 (e-book)
Information security in diverse computing environments
Information security in diverse computing environments
[electronic resource] /Anne Kayem and Christoph Meinel, editors. - Hershey, Pennsylvania :IGI Global,[2014] - 1 online resource (xxiv, 354 p.)
Includes bibliographical references.
Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam.
Restricted to subscribers or individual electronic text purchasers.
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
ISBN: 9781466661592 (e-book)Subjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / .I54154 2014e
Dewey Class. No.: 005.8
Information security in diverse computing environments
LDR
:03202nmm a2200277 a 4500
001
560087
003
IGIG
005
20191022100818.0
006
m o d
007
cr cn
008
200109s2014 pau fob 000 0 eng d
010
$z
2014013850
020
$a
9781466661592 (e-book)
020
$a
9781466661585 (hardback)
035
$a
(OCoLC)891329605
035
$a
1081021234
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
.I54154 2014e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Information security in diverse computing environments
$h
[electronic resource] /
$c
Anne Kayem and Christoph Meinel, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2014]
300
$a
1 online resource (xxiv, 354 p.)
504
$a
Includes bibliographical references.
505
0
$a
Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
0
$a
Information technology
$x
Security measures.
$3
238552
700
1
$a
Kayem, Anne,
$d
1975-
$e
editor.
$3
843669
700
1
$a
Meinel, Christoph,
$d
1954-
$e
editor.
$3
843670
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000172158
電子館藏
1圖書
電子書
EB QA76.9.A25 .I54154 2014 [2014]
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login