語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Handbook of research on threat detec...
~
Al-Hamami, Alaa Hussein (1948-)
Handbook of research on threat detection and countermeasures in network security
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
al-SaadooGhossoon M. Waleed, 1969-
其他作者:
Al-HamamiAlaa Hussein, 1948-
其他團體作者:
IGI Global
面頁冊數:
PDFs (426 pages)illustrations. :
標題:
Computer networks - Security measures. -
標題:
Attack methods
標題:
Authentication techniques
標題:
Biometric security
標題:
Cryptography techniques
標題:
Cyber security
標題:
Database protection
標題:
Digital signatures
標題:
Security simulation
標題:
Steganography
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
附註:
Content Type: text
摘要註:
"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
ISBN:
9781466665842
內容註:
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad Crime profiling system / Hussein Zedan, Meshrif Alruily Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem Biometric security / Muzhir Shaban Al-Ani Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi The impact of big data on security / Mohammad Alaa Hussain Al-Hamami 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab Trust determination in wireless ad hoc networks / Hussein Al-Bahadili Security in mobile computing / Venus W. Samawi The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami Security in digital images: from information hiding perspective / Mohammed A. Otair.
Handbook of research on threat detection and countermeasures in network security
Handbook of research on threat detection and countermeasures in network security
/ Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors. - PDFs (426 pages) ; illustrations..
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon.
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references and index..
ISBN 9781466665842ISBN 9781466665835ISBN 9781466665866
Computer networks -- Security measures.
Attack methodsAuthentication techniquesBiometric securityCryptography techniquesCyber securityDatabase protectionDigital signaturesSecurity simulationSteganography
al-Saadoo, Ghossoon M. Waleed
Handbook of research on threat detection and countermeasures in network security
LDR
:03941nam a2200481 450
001
288670
005
20150520112536.0
009
a(CaBNVSL)gtp00562796
009
a(OCoLC)908145817
009
00000239
010
1
$a
9781466665842
$b
ebook
010
1
$a
9781466665835
010
1
$a
9781466665866
012
0
$a
10.4018/978-1-4666-6583-5
020
$b
2014029335
100
$a
20151127d2015 y0engy50 b
102
$a
us
105
$a
a a 001yy
200
1
$a
Handbook of research on threat detection and countermeasures in network security
$f
Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors.
215
1
$a
PDFs (426 pages)
$c
illustrations.
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-6583-5
310
$a
Also available in print.
320
$a
Includes bibliographical references and index.
327
1
$a
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
$a
Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem
$a
Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon
$a
Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef
$a
Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani
$a
Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad
$a
Crime profiling system / Hussein Zedan, Meshrif Alruily
$a
Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami
$a
Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy
$a
Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem
$a
Biometric security / Muzhir Shaban Al-Ani
$a
Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi
$a
Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa
$a
Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi
$a
The impact of big data on security / Mohammad Alaa Hussain Al-Hamami
$a
16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan
$a
A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab
$a
Trust determination in wireless ad hoc networks / Hussein Al-Bahadili
$a
Security in mobile computing / Venus W. Samawi
$a
The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami
$a
Security in digital images: from information hiding perspective / Mohammed A. Otair.
330
$a
"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2014029335
452
1
$1
300
$a
Print version:
$1
001(DLC) 2014029335
$1
0101
$a
1466665831; 9781466665835
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
610
1
$a
Attack methods
610
1
$a
Authentication techniques
610
1
$a
Biometric security
610
1
$a
Cryptography techniques
610
1
$a
Cyber security
610
1
$a
Database protection
610
1
$a
Digital signatures
610
1
$a
Security simulation
610
1
$a
Steganography
676
$a
005.8
$v
23
680
$a
TK5105.59
$b
.A393 2015e
702
1
$a
al-Saadoo
$b
Ghossoon M. Waleed
$f
1969-
$4
editor.
$3
385137
702
1
$a
Al-Hamami
$b
Alaa Hussein
$f
1948-
$4
editor.
$3
385136
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入