000 | 03950cam a2200349Ii 4500 | ||
---|---|---|---|
001 | 9780429090660 | ||
008 | 180331t20152015fluac ob 001 0 eng d | ||
020 |
_a9780429090660 _q(e-book : PDF) |
||
020 |
_z9781482207064 _q(hardback) |
||
020 |
_z9781138034136 _q(paperback) |
||
024 | 7 |
_a10.1201/b17352 _2doi |
|
035 | _a(OCoLC)887498569 | ||
040 |
_aFlBoTFG _cFlBoTFG _erda |
||
050 | 4 |
_aQA76.9.A25 _bC426 2015 |
|
082 | 0 | 4 |
_a005.8 _bC337 |
245 | 0 | 0 |
_aCase studies in secure computing : _bachievements and trends / _cedited by Biju Issac and Nauman Israr. |
264 | 1 |
_aBoca Raton : _bTaylor & Francis, CRC Press, _c[2015] |
|
264 | 4 | _c©2015 | |
300 | _a1 online resource | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
500 | _aAn Auerbach book. | ||
505 | 0 | _a1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar. | |
650 | 0 |
_aComputer security _vCase studies. _918634 |
|
650 | 0 |
_aComputer networks _xSecurity measures _vCase studies. _918635 |
|
700 | 1 |
_aIssac, Biju, _eeditor. _918636 |
|
700 | 1 |
_aIsrar, Nauman, _eeditor. _918637 |
|
776 | 0 | 8 |
_iPrint version: _z9781482207064 _w(DLC) 2014009581 |
856 | 4 | 0 |
_uhttps://www.taylorfrancis.com/books/9781482207071 _zClick here to view. |
942 | _cEBK | ||
999 |
_c71857 _d71857 |