語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on modern crypt...
~
Agrawal, Dharma P. (1945-)
Handbook of research on modern cryptographic solutions for computer and cyber security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Handbook of research on modern cryptographic solutions for computer and cyber securityBrij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
其他作者:
Gupta, Brij,
出版者:
Hershey, Pennsylvania :IGI Global,[2016]
面頁冊數:
1 online resource (589 p.) :ill.
標題:
Data encryption (Computer science)
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
ISBN:
9781522501060 (ebk.)
Handbook of research on modern cryptographic solutions for computer and cyber security
Handbook of research on modern cryptographic solutions for computer and cyber security
[electronic resource] /Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. - Hershey, Pennsylvania :IGI Global,[2016] - 1 online resource (589 p.) :ill.
Includes bibliographical references and index.
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
Restricted to subscribers or individual electronic text purchasers.
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522501060 (ebk.)Subjects--Topical Terms:
184520
Data encryption (Computer science)
Subjects--Index Terms:
Ad hoc network security
LC Class. No.: QA76.9.A25 / H364 2016e
Dewey Class. No.: 005.8/2
Handbook of research on modern cryptographic solutions for computer and cyber security
LDR
:04187nmm a2200433 i 4500
001
510356
003
IGIG
005
19991101153922.0
006
m eo d
007
cr bn |||m|||a
008
171129s2016 paua fob 001 0 eng d
010
$z
2016002930
020
$a
9781522501060 (ebk.)
020
$a
9781522501053 (hbk.)
035
$a
(CaBNVSL)gtp00565763
035
$a
(OCoLC)950680427
035
$a
0000000293
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
H364 2016e
082
0 0
$a
005.8/2
$2
23
245
0 0
$a
Handbook of research on modern cryptographic solutions for computer and cyber security
$h
[electronic resource] /
$c
Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2016]
300
$a
1 online resource (589 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
505
8
$a
Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 05/20/2016).
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Cyberterrorism.
$3
283235
650
0
$a
Cyberterrorism
$x
Prevention.
$3
274740
650
0
$a
Computer security
$x
Government policy.
$3
367204
653
$a
Ad hoc network security
653
$a
Botnet detection
653
$a
Cyber crime
653
$a
Cyber warfare
653
$a
Defense techniques
653
$a
Forensic tools
653
$a
Visual analytics
653
$a
Wireless security
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
777857
700
1
$a
Agrawal, Dharma P.
$q
(Dharma Prakash),
$d
1945-
$e
editor.
$3
777858
700
1
$a
Yamaguchi, Shingo,
$d
1969-
$e
editor.
$3
777859
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000140495
電子館藏
1圖書
電子書
EB QA76.9.A25 H364 [2016]
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入