Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Handbook of research on modern crypt...
~
Agrawal, Dharma P. (1945-)
Handbook of research on modern cryptographic solutions for computer and cyber security
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Handbook of research on modern cryptographic solutions for computer and cyber security/ Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
other author:
Gupta, Brij,
Published:
Hershey, Pennsylvania :IGI Global, : [2016],
Description:
1 online resource (589 p.) :ill. :
Subject:
Data encryption (Computer science) -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
ISBN:
9781522501060 (ebk.)
Handbook of research on modern cryptographic solutions for computer and cyber security
Handbook of research on modern cryptographic solutions for computer and cyber security
[electronic resource] /Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors. - Hershey, Pennsylvania :IGI Global,[2016] - 1 online resource (589 p.) :ill.
Includes bibliographical references and index.
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
Restricted to subscribers or individual electronic text purchasers.
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
Mode of access: World Wide Web.
ISBN: 9781522501060 (ebk.)Subjects--Topical Terms:
658943
Data encryption (Computer science)
Subjects--Index Terms:
Ad hoc network security
LC Class. No.: QA76.9.A25 / H364 2016e
Dewey Class. No.: 005.8/2
Handbook of research on modern cryptographic solutions for computer and cyber security
LDR
:04187nam a2200433 i 4500
001
880943
003
IGIG
005
19991101153922.0
006
m eo d
007
cr bn |||m|||a
008
180214s2016 paua fob 001 0 eng d
010
$z
2016002930
020
$a
9781522501060 (ebk.)
020
$a
9781522501053 (hbk.)
035
$a
(CaBNVSL)gtp00565763
035
$a
(OCoLC)950680427
035
$a
0000000293
040
$a
CaBNVSL
$b
eng
$e
rda
$c
CaBNVSL
$d
CaBNVSL
050
0 0
$a
QA76.9.A25
$b
H364 2016e
082
0 0
$a
005.8/2
$2
23
245
0 0
$a
Handbook of research on modern cryptographic solutions for computer and cyber security
$h
[electronic resource] /
$c
Brij Gupta, Dharma P. Agrawal, and Shingo Yamaguchi, editors.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2016]
300
$a
1 online resource (589 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Data security in wired and wireless systems / Abhinav Prakash, Dharma Prakash Agarwal -- A new view of privacy in social networks: strengthening privacy during propagation / Wei Chang, Jie Wu -- A survey of botnet-based DDoS flooding attacks of application layer: detection and mitigation approaches / Esraa Alomari [and 5 others] -- Cyber risk: a big challenge in developed and emerging markets / Maria Cristina Arcuri, Marina Brogi, Gino Gandolfi -- Security in ad hoc network and computing paradigms / Poonam Saini, Awadhesh Kumar Singh -- Audio Stego intrusion detection system through hybrid neural tree model / S. Geetha, Siva S. Sivatha Sindhu -- Introduction of Petri nets: its applications and security challenges / Shingo Yamaguchi, Mohd Anuaruddin Bin Ahmadon, Qi-Wei Ge -- Discovering periodicity in network flows for security monitoring / Neminath Hubballi, Deepanshu Goyal -- Secure and privacy preserving keyword search over the large scale cloud data / Wei Zhang, Jie Wu, Yaping Lin -- Auditing defense against XSS worms in online social network-based web applications / Pooja Chaudhary, Shashank Gupta, B. B. Gupta -- Digital image watermarking: techniques and emerging applications / Amit Kumar Singh [and 4 others] -- Security issues and countermeasures of online transaction in e-commerce / Sarvesh Tanwar Harshita -- Securing the human cloud: applying biometrics to wearable technology / Pallavi Meharia, Dharma Prakash Agarwal --
505
8
$a
Provable security for public key cryptosystems: how to prove that the cryptosystem is secure / Syed Taqi Ali -- Secure key establishment in wireless sensor networks / Suman Bala, Gaurav Sharma, Anil K. Verma -- Threats classification: state of the art / Mouna Jouini, Latifa Ben Arfa Rabai -- Analysis of various security issues and challenges in cloud computing environment: a survey / Zhaolong Gou, Shingo Yamaguchi, B. B. Gupta -- Review of link structure based ranking algorithms and hanging pages / Ravi P. Kumar, Ashutosh K. Singh, Anand Mohan -- Application of face recognition techniques in video for biometric security: a review of basic methods and emerging trends / Bijuphukan Bhagabati, Kandarpa Kumar Sarma -- Reviewing the security features in contemporary security policies and models for multiple platforms / Omkar Badve, B. B. Gupta, Shashank Gupta -- DNA sequence based cryptographic solution for secure image transmission / Grasha Jacob, Murugan Annamalai.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions"--Provided by publisher.
530
$a
Also available in print.
538
$a
Mode of access: World Wide Web.
588
$a
Description based on title screen (IGI Global, viewed 05/20/2016).
650
0
$a
Data encryption (Computer science)
$3
658943
650
0
$a
Cyberterrorism.
$3
567029
650
0
$a
Cyberterrorism
$x
Prevention.
$3
659766
650
0
$a
Computer security
$x
Government policy.
$3
659739
653
$a
Ad hoc network security
653
$a
Botnet detection
653
$a
Cyber crime
653
$a
Cyber warfare
653
$a
Defense techniques
653
$a
Forensic tools
653
$a
Visual analytics
653
$a
Wireless security
700
1
$a
Gupta, Brij,
$d
1982-
$e
editor.
$3
1133066
700
1
$a
Agrawal, Dharma P.
$q
(Dharma Prakash),
$d
1945-
$3
797683
700
1
$a
Yamaguchi, Shingo,
$d
1969-
$e
editor.
$3
1133067
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-0105-3
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login