語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Proceedings of International Ethical...
~
SpringerLink (Online service)
Proceedings of International Ethical Hacking Conference 2019 = eHaCON 2019, Kolkata, India /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Proceedings of International Ethical Hacking Conference 2019/ edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas.
其他題名:
eHaCON 2019, Kolkata, India /
其他作者:
Balas, Valentina E.
面頁冊數:
XXVI, 252 p.online resource. :
Contained By:
Springer Nature eBook
標題:
Data Structures and Information Theory. -
電子資源:
https://doi.org/10.1007/978-981-15-0361-0
ISBN:
9789811503610
Proceedings of International Ethical Hacking Conference 2019 = eHaCON 2019, Kolkata, India /
Proceedings of International Ethical Hacking Conference 2019
eHaCON 2019, Kolkata, India /[electronic resource] :edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas. - 1st ed. 2020. - XXVI, 252 p.online resource. - Advances in Intelligent Systems and Computing,10652194-5357 ;. - Advances in Intelligent Systems and Computing,335.
Review and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain’s energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network -- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption. .
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
ISBN: 9789811503610
Standard No.: 10.1007/978-981-15-0361-0doiSubjects--Topical Terms:
1211601
Data Structures and Information Theory.
LC Class. No.: TK1-9971
Dewey Class. No.: 621.382
Proceedings of International Ethical Hacking Conference 2019 = eHaCON 2019, Kolkata, India /
LDR
:03388nam a22003975i 4500
001
1026842
003
DE-He213
005
20200702073112.0
007
cr nn 008mamaa
008
210318s2020 si | s |||| 0|eng d
020
$a
9789811503610
$9
978-981-15-0361-0
024
7
$a
10.1007/978-981-15-0361-0
$2
doi
035
$a
978-981-15-0361-0
050
4
$a
TK1-9971
072
7
$a
TJK
$2
bicssc
072
7
$a
TEC041000
$2
bisacsh
072
7
$a
TJK
$2
thema
082
0 4
$a
621.382
$2
23
245
1 0
$a
Proceedings of International Ethical Hacking Conference 2019
$h
[electronic resource] :
$b
eHaCON 2019, Kolkata, India /
$c
edited by Mohuya Chakraborty, Satyajit Chakrabarti, Valentina E. Balas.
250
$a
1st ed. 2020.
264
1
$a
Singapore :
$b
Springer Singapore :
$b
Imprint: Springer,
$c
2020.
300
$a
XXVI, 252 p.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
1065
505
0
$a
Review and Comparison of Face Detection Techniques -- Keyword Spotting with Neural Networks used for Image-Classification -- Strategic Way to Count the Number of People in a Room Using Multiple Kinect Cameras -- Biomedical Image Security using Matrix Manipulation and DNA Encryption -- A study on the issue of blockchain’s energy consumption -- Study on network scanning using machine learning based methods -- Is Blockchain the Future of Supply Chain Management? -- APDRChain: ANN Based Predictive Analysis of Diseases and Report Sharing Through Blockchain -- Study on S-box Properties of Convolution Coder -- Smart Healthcare Assistance towards on-road Medical Emergency -- A Study on Various Database Models: Relational, Graph and Hybrid Databases -- Microcontroller Based Automotive Control System Employing Real Time Health Monitoring of Drivers to Avoid Road Accidents -- Surface Potential Profile of Nano scaled Work function Engineered Gate Recessed IR Silicon on Insulator MOSFET -- A mobile user authentication technique in Global mobility network -- Efficient Entity Authentication using modified Guillou-Quisquater Zero Knowledge Protocol -- Ethical Hacking: Redefining Security in Information System -- Internal Organizational Security -- Securing Air Gapped Systems -- Data Security Techniques based on DNA Encryption. .
520
$a
This book gathers the peer-reviewed proceedings of the International Ethical Hacking Conference, eHaCON 2019, the second international conference of its kind, which was held in Kolkata, India, in August 2019. Bringing together the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security lessons learned. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
650
2 4
$a
Data Structures and Information Theory.
$3
1211601
650
2 4
$a
Systems and Data Security.
$3
677062
650
1 4
$a
Communications Engineering, Networks.
$3
669809
650
0
$a
Data structures (Computer science).
$3
680370
650
0
$a
Computer security.
$3
557122
650
0
$a
Electrical engineering.
$3
596380
700
1
$a
Balas, Valentina E.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1319311
700
1
$a
Chakrabarti, Satyajit.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1214257
700
1
$a
Chakraborty, Mohuya.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1308886
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9789811503603
776
0 8
$i
Printed edition:
$z
9789811503627
830
0
$a
Advances in Intelligent Systems and Computing,
$x
2194-5357 ;
$v
335
$3
1253884
856
4 0
$u
https://doi.org/10.1007/978-981-15-0361-0
912
$a
ZDB-2-ENG
912
$a
ZDB-2-SXE
950
$a
Engineering (SpringerNature-11647)
950
$a
Engineering (R0) (SpringerNature-43712)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入