서브메뉴
검색
Architectures and protocols for secure information technology infrastructures- [electronic resource]
Architectures and protocols for secure information technology infrastructures- [electronic resource]
상세정보
- 자료유형
- 단행본
- International Standard Book Number
- 9781466645158 (electronic bk.)
- International Standard Book Number
- 1466645156 (electronic bk.)
- International Standard Book Number
- 9781466645141
- International Standard Book Number
- 1466645148
- International Standard Book Number
- 9781466645165
- International Standard Book Number
- 1466645164
- Library of Congress Call Number
- QA76.9.A25-A73 2014
- Dewey Decimal Classification Number
- 005.8-23
- Publication, Distribution, etc. (Imprint
- Hershey PA : Information Science Reference, an imprint of IGI Global, c2014
- Physical Description
- 1 online resource (xx, 405 p) : ill.
- Series Statement
- Premier reference source
- Series Statement
- Advances in Information Security, Privacy, and Ethics (AISPE) = 1948-9749
- Bibliography, Etc. Note
- Includes bibliographical references (p. 366-394) and index.
- Formatted Contents Note
- Sect. 1. State-of-the-art -- Security and privacy issues in cloud computing Jaydip Sen -- Towards a certified electronic mail system Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- Sect. 2. Cryptographic algorithms and security protocols -- A new encryption algorithm based on chaotic map for wireless sensor network Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Sect. 3. Malware and intrusion detection systems -- Host-based intrusion detection systems: architectures, solutions, and challenges Vít Bukac, Vashek Matyáš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches Ciprian Pungila, Viorel Negru -- Sect. 4. Secure platforms and frameworks -- A mobile-based attribute aggregation architecture for user-centric identity management Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care Alberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.
- Summary, Etc.
- 요약"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--해제Provided by publisher.
- Subject Added Entry-Topical Term
- Information technology Security measures
- Subject Added Entry-Topical Term
- Computer networks Security measures
- Subject Added Entry-Topical Term
- COMPUTERS / Internet / Security.
- Subject Added Entry-Topical Term
- COMPUTERS / Networking / Security.
- Subject Added Entry-Topical Term
- COMPUTERS / Security / General.
- Added Entry-Personal Name
- Martinez, Antonio Ruiz , 1976-
- Added Entry-Personal Name
- Garcia, Fernando Pereniguez , 1984-
- Added Entry-Personal Name
- Marin-Lopez, Rafael , 1977-
- Additional Physical Form Entry
- Print version Architectures and protocols for secure information technology infrastructures. Hershey PA : Information Science Reference, an imprint of IGI Global, [2014] 9781466645141 (DLC) 2013020692 (OCoLC)843857015
- Series Added Entry-Uniform Title
- Advances in information security, privacy, and ethics. 1948-9730
- Electronic Location and Access
- 로그인을 한후 보실 수 있는 자료입니다.
- Control Number
- joongbu:422480
MARC
008140102s2014 paua ob 001 0 eng d■001
■003OCoLC
■00520140127111319
■006m o d
■007cr cnu---unuuu
■019 ▼a859298485
■020 ▼a9781466645158 (electronic bk.)
■020 ▼a1466645156 (electronic bk.)
■020 ▼z9781466645141
■020 ▼z1466645148
■020 ▼z9781466645165
■020 ▼z1466645164
■035 ▼a(OCoLC)855019703
■040 ▼aN$T▼beng▼epn▼cN$T▼dIDEBK▼dOCLCA▼dCDX▼dE7B▼dIGIGL▼dFTU▼dYDXCP▼dOCLCO
■050 4▼aQA76.9.A25▼bA73 2014
■072 7▼aCOM▼x060040▼2bisacsh
■072 7▼aCOM▼x043050▼2bisacsh
■072 7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼223
■24500▼aArchitectures and protocols for secure information technology infrastructures▼h[electronic resource]▼dAntonio Ruiz Martínez, Fernando Pereñíguez Garcia, Rafael Marin-López, [editors]
■260 ▼aHershey PA▼bInformation Science Reference, an imprint of IGI Global▼cc2014
■300 ▼a1 online resource (xx, 405 p) ▼bill.
■336 ▼atext▼btxt▼2rdacontent
■337 ▼acomputer▼bc▼2rdamedia
■338 ▼aonline resource▼bcr▼2rdacarrier
■4900 ▼aPremier reference source
■4900 ▼aAdvances in Information Security, Privacy, and Ethics (AISPE)▼x1948-9749
■504 ▼aIncludes bibliographical references (p. 366-394) and index.
■50500▼gSect. 1.▼tState-of-the-art --▼tSecurity and privacy issues in cloud computing▼rJaydip Sen --▼tTowards a certified electronic mail system▼rGerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber --▼tMobile IPv6: mobility management and security aspects▼rTayo Arulogun, Ahmad AlSa'deh, Christoph Meinel --▼gSect. 2.▼tCryptographic algorithms and security protocols --▼tA new encryption algorithm based on chaotic map for wireless sensor network▼rGhada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet --▼tA polling booth-based electronic voting scheme▼rMd. Abdul Based --▼tChallenges and solutions for DNS security in IPv6▼rHosnieh Rafiee, Martin von Löwis, Christoph Meinel --▼gSect. 3.▼tMalware and intrusion detection systems --▼tHost-based intrusion detection systems: architectures, solutions, and challenges▼rVít Bukac, Vashek Matyáš --▼tEnhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm▼rYuxin Meng, Lam-For Kwok --▼tTowards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches▼rCiprian Pungila, Viorel Negru --▼gSect. 4.▼tSecure platforms and frameworks --▼tA mobile-based attribute aggregation architecture for user-centric identity management▼rAlexandre B. Augusto, Manuel E. Correia --▼tThe Austrian identity ecosystem: an e-government experience▼rKlaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer --▼tDeveloping secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project▼rAndrea Atzeni, John Lyle, Shamal Faily --▼tSecuring XML with role-based access control: case study in health care▼rAlberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.
■520 ▼a"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--▼cProvided by publisher.
■588 ▼aDescription based on print version record and online resource ; title from PDF title page (EBSCOhost eBook Collection, viewed Oct. 17, 2013).
■650 0▼aInformation technology▼xSecurity measures
■650 0▼aComputer networks▼xSecurity measures
■650 7▼aCOMPUTERS / Internet / Security.▼2bisacsh
■650 7▼aCOMPUTERS / Networking / Security.▼2bisacsh
■650 7▼aCOMPUTERS / Security / General.▼2bisacsh
■7001 ▼aMartinez, Antonio Ruiz▼d1976-▼eeditor of compilation.
■7001 ▼aGarcia, Fernando Pereniguez▼d1984-▼eeditor of compilation.
■7001 ▼aMarin-Lopez, Rafael▼d1977-▼eeditor of compilation.
■77608▼iPrint version▼tArchitectures and protocols for secure information technology infrastructures.▼dHershey PA : Information Science Reference, an imprint of IGI Global, [2014]▼z9781466645141▼w(DLC) 2013020692▼w(OCoLC)843857015
■830 0▼aAdvances in information security, privacy, and ethics.▼x1948-9730
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=621904
■938 ▼aEBSCOhost▼bEBSC▼n621904
■938 ▼aIngram Digital eBook Collection▼bIDEB▼ncis26005486
■938 ▼aCoutts Information Services▼bCOUT▼n26005486
■938 ▼aebrary▼bEBRY▼nebr10739999
■938 ▼aIGI Global▼bIGIG▼n00076712
■938 ▼aYBP Library Services▼bYANK▼n10922801
■994 ▼a92▼bK4R
■999 ▼z635217623907107158