Книга Network and Information Security: Issues, Challenges and Research Trends

Формат
Язык книги
Издательство
Год издания

Due to increasing sophistication in attackers’ ability to launch attacks and growing dependence of users on the Internet, development of effective security mechanism has become a necessity while being a challenging task.

Network and Information Security takes a holistic view for understanding of different types of network and information security threats, designing tools and mechanisms to defend against various threats. Accordingly, it covers audio watermarking scheme for secure distribution of audio files, fusion of fingerprint and iris biometrics using BPSO, meta ensemble classifier for anomaly based IDS, network security tools and systems, formal verification of firewall anomalies, detection of Botnets, dynamic SQL classification, trust in web services and cloud computing environment, Identity Based Signatures (IBS), Side Channel Attacks (SCA), symmetric key generation using chaos theory, identity privacy in UMTS, and security vulnerabilities in CRNs.

Код товара
20463491
Характеристики
Тип обложки
Твердый
Язык
Английский
Описание книги

Due to increasing sophistication in attackers’ ability to launch attacks and growing dependence of users on the Internet, development of effective security mechanism has become a necessity while being a challenging task.

Network and Information Security takes a holistic view for understanding of different types of network and information security threats, designing tools and mechanisms to defend against various threats. Accordingly, it covers audio watermarking scheme for secure distribution of audio files, fusion of fingerprint and iris biometrics using BPSO, meta ensemble classifier for anomaly based IDS, network security tools and systems, formal verification of firewall anomalies, detection of Botnets, dynamic SQL classification, trust in web services and cloud computing environment, Identity Based Signatures (IBS), Side Channel Attacks (SCA), symmetric key generation using chaos theory, identity privacy in UMTS, and security vulnerabilities in CRNs.

Отзывы
Возникли вопросы? 0-800-335-425
3237 грн
Нет в наличии
Бумажная книга