語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security in diverse comp...
~
Kayem, Anne, (1975-)
Information security in diverse computing environments
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security in diverse computing environmentsAnne Kayem and Christoph Meinel, editors.
其他作者:
Kayem, Anne,
出版者:
Hershey, Pennsylvania :IGI Global,[2014]
面頁冊數:
1 online resource (xxiv, 354 p.)
標題:
Computer security.
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
ISBN:
9781466661592 (e-book)
Information security in diverse computing environments
Information security in diverse computing environments
[electronic resource] /Anne Kayem and Christoph Meinel, editors. - Hershey, Pennsylvania :IGI Global,[2014] - 1 online resource (xxiv, 354 p.)
Includes bibliographical references.
Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam.
Restricted to subscribers or individual electronic text purchasers.
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
ISBN: 9781466661592 (e-book)Subjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25 / .I54154 2014e
Dewey Class. No.: 005.8
Information security in diverse computing environments
LDR
:03202nmm a2200277 a 4500
001
560087
003
IGIG
005
20191022100818.0
006
m o d
007
cr cn
008
200109s2014 pau fob 000 0 eng d
010
$z
2014013850
020
$a
9781466661592 (e-book)
020
$a
9781466661585 (hardback)
035
$a
(OCoLC)891329605
035
$a
1081021234
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
.I54154 2014e
082
0 0
$a
005.8
$2
23
245
0 0
$a
Information security in diverse computing environments
$h
[electronic resource] /
$c
Anne Kayem and Christoph Meinel, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2014]
300
$a
1 online resource (xxiv, 354 p.)
504
$a
Includes bibliographical references.
505
0
$a
Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noël, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection.
$3
202312
650
0
$a
Information technology
$x
Security measures.
$3
238552
700
1
$a
Kayem, Anne,
$d
1975-
$e
editor.
$3
843669
700
1
$a
Meinel, Christoph,
$d
1954-
$e
editor.
$3
843670
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000172158
電子館藏
1圖書
電子書
EB QA76.9.A25 .I54154 2014 [2014]
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6158-5
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入