000 03950cam a2200349Ii 4500
001 9780429090660
008 180331t20152015fluac ob 001 0 eng d
020 _a9780429090660
_q(e-book : PDF)
020 _z9781482207064
_q(hardback)
020 _z9781138034136
_q(paperback)
024 7 _a10.1201/b17352
_2doi
035 _a(OCoLC)887498569
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9.A25
_bC426 2015
082 0 4 _a005.8
_bC337
245 0 0 _aCase studies in secure computing :
_bachievements and trends /
_cedited by Biju Issac and Nauman Israr.
264 1 _aBoca Raton :
_bTaylor & Francis, CRC Press,
_c[2015]
264 4 _c©2015
300 _a1 online resource
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
500 _aAn Auerbach book.
505 0 _a1. Survey of secure computing / Kuruvilla Mathew and Biju Issac -- 2. Feature selection and decision tree : a combinational approach for intrusion detection / Hari Om and Alok Kumar Gupta -- 3. Fuzzy logic-based application security risk assessment / Hossain Shahriar, Hisham M. Haddad, and Ishan Vaidya -- 4. Authenticated multiple-key establishment protocol for wireless sensor networks / Jayaprakash Kar -- 5. Tees Confidentiality Model (TCM2) : supporting dynamic authorization and overrides in attribute-based access control / Jim Longstaff and Tony Howitt -- 6. Design and analysis of independent, open-access wi-fi monitoring infrastructures in live environments / Jonny Milliken, Kian Meng Yap, and Alan Marshall -- 7. Security attacks and countermeasures in cloud computing / Kashif Munir, Lawan Ahmad Mohammad, and Sellapan Palaniappan -- 8. Optimizing ant-based internet protocol traceback / Mohammad Hamedi-Hamzehkolaie, Mohammad Javad Shamani, and M. B. Ghaznavi-Ghoushchi -- 9. A case study on security issues in LTE backhaul and core networks / Madhusanka Liyanage, Mika Ylianttila, and Andrei Gurtov -- 10. A case study of intelligent IDS false alarm reduction in cloud environments : challenges and trends / Yuxin Meng, Wenjuan Li, and Lam-For Kwok -- 11. Attacks in wireless sensor networks and their countermeasures / Mukesh Kumar and Kamlesh Dutta -- 12. Privacy-preserving identity-based broadcast encryption and its applications / Muthulakshmi Angamuthu, Anitha Ramalingam, and Thanalakshmi Perumal -- 13. The impact of application-layer denial-of-service attacks / Hugo Gonzalez, Marc Antoine Gosselin-Lavigne, Natalia Stakhanova, and Ali A. Ghorbani -- 14. Classification of radical messages on Twitter using security associations / Pooja Wadhwa and M.P.S. Bhatia -- 15. Toward effective malware clustering : reducing false negatives through feature weighting and the Lp metric / Renato Cordeiro de Amorim and Peter Komisarczuk -- 16. Reversible watermarking : theory and practice / Ruchira Naskar and Rajat Subhra Chakraborty -- 17. Web application security attacks and countermeasures / Tushar Kanti Saha and A.B.M. Shawkat Ali -- 18. Security in mobile networks : a novel challenge and solution / Tran Quang Thanh, Yacine Rebahi, and Thomas Magedanz -- 19. Web session security : attack and defense techniques / Zachary Evans and Hossain Shahriar -- 20. Internet botnets : a survey of detection techniques / Boris Nechaev and Andrei Gurtov -- 21. Creating a solid information security infrastructure through the use of the intelligence cycle : a case study / Carlos F. Lerma Resendez -- 22. A novel construction of certificateless signcryption scheme for smart card / Jayaprakash Kar.
650 0 _aComputer security
_vCase studies.
_918634
650 0 _aComputer networks
_xSecurity measures
_vCase studies.
_918635
700 1 _aIssac, Biju,
_eeditor.
_918636
700 1 _aIsrar, Nauman,
_eeditor.
_918637
776 0 8 _iPrint version:
_z9781482207064
_w(DLC) 2014009581
856 4 0 _uhttps://www.taylorfrancis.com/books/9781482207071
_zClick here to view.
942 _cEBK
999 _c71857
_d71857