語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of International Ethical...
~
(1998 :)
Proceedings of International Ethical Hacking Conference 2019eHaCON 2019, Kolkata, India /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Proceedings of International Ethical Hacking Conference 2019edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas.
其他題名:
eHaCON 2019, Kolkata, India /
其他題名:
eHaCON 2019
其他作者:
Chakraborty, Mohuya.
團體作者:
出版者:
Singapore :Springer Singapore :2020.
面頁冊數:
xxvi, 252 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Computer securityCongresses.
電子資源:
https://doi.org/10.1007/978-981-15-0361-0
ISBN:
9789811503610$q(electronic bk.)
Proceedings of International Ethical Hacking Conference 2019eHaCON 2019, Kolkata, India /
Proceedings of International Ethical Hacking Conference 2019
eHaCON 2019, Kolkata, India /[electronic resource] :eHaCON 2019edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas. - Singapore :Springer Singapore :2020. - xxvi, 252 p. :ill., digital ;24 cm. - Advances in intelligent systems and computing,v.10652194-5357 ;. - Advances in intelligent systems and computing ;176..
Review and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain's energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network -- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption.
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
ISBN: 9789811503610$q(electronic bk.)
Standard No.: 10.1007/978-981-15-0361-0doiSubjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Proceedings of International Ethical Hacking Conference 2019eHaCON 2019, Kolkata, India /
LDR
:03124nmm a2200349 a 4500
001
574140
003
DE-He213
005
20200312172351.0
006
m d
007
cr nn 008maaau
008
201007s2020 si s 0 eng d
020
$a
9789811503610$q(electronic bk.)
020
$a
9789811503603$q(paper)
024
7
$a
10.1007/978-981-15-0361-0
$2
doi
035
$a
978-981-15-0361-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2019
111
2
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Proceedings of International Ethical Hacking Conference 2019
$h
[electronic resource] :
$b
eHaCON 2019, Kolkata, India /
$c
edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas.
246
3
$a
eHaCON 2019
260
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
xxvi, 252 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advances in intelligent systems and computing,
$x
2194-5357 ;
$v
v.1065
505
0
$a
Review and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain's energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network -- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption.
520
$a
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
650
0
$a
Computer security
$v
Congresses.
$3
383239
650
0
$a
Hacking
$v
Congresses.
$3
861711
650
1 4
$a
Communications Engineering, Networks.
$3
273745
650
2 4
$a
Systems and Data Security.
$3
274481
650
2 4
$a
Data Structures and Information Theory.
$3
825714
700
1
$a
Chakraborty, Mohuya.
$3
832572
700
1
$a
Chakrabarti, Satyajit.
$3
861709
700
1
$a
Balas, Valentina E.
$3
861710
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Advances in intelligent systems and computing ;
$v
176.
$3
567349
856
4 0
$u
https://doi.org/10.1007/978-981-15-0361-0
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000180406
電子館藏
1圖書
電子書
EB QA76.9.A25 I61 2019 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/978-981-15-0361-0
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入