본문

서브메뉴

Architectures and protocols for secure information technology infrastructures- [electronic resource]
Architectures and protocols for secure information technology infrastructures- [electronic resource]

상세정보

자료유형  
 단행본
International Standard Book Number  
9781466645158 (electronic bk.)
International Standard Book Number  
1466645156 (electronic bk.)
International Standard Book Number  
9781466645141
International Standard Book Number  
1466645148
International Standard Book Number  
9781466645165
International Standard Book Number  
1466645164
Library of Congress Call Number  
QA76.9.A25-A73 2014
Dewey Decimal Classification Number  
005.8-23
Publication, Distribution, etc. (Imprint  
Hershey PA : Information Science Reference, an imprint of IGI Global, c2014
Physical Description  
1 online resource (xx, 405 p) : ill.
Series Statement  
Premier reference source
Series Statement  
Advances in Information Security, Privacy, and Ethics (AISPE) = 1948-9749
Bibliography, Etc. Note  
Includes bibliographical references (p. 366-394) and index.
Formatted Contents Note  
Sect. 1. State-of-the-art -- Security and privacy issues in cloud computing Jaydip Sen -- Towards a certified electronic mail system Gerard Draper-Gil, Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber -- Mobile IPv6: mobility management and security aspects Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel -- Sect. 2. Cryptographic algorithms and security protocols -- A new encryption algorithm based on chaotic map for wireless sensor network Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet -- A polling booth-based electronic voting scheme Md. Abdul Based -- Challenges and solutions for DNS security in IPv6 Hosnieh Rafiee, Martin von Löwis, Christoph Meinel -- Sect. 3. Malware and intrusion detection systems -- Host-based intrusion detection systems: architectures, solutions, and challenges Vít Bukac, Vashek Matyáš -- Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm Yuxin Meng, Lam-For Kwok -- Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches Ciprian Pungila, Viorel Negru -- Sect. 4. Secure platforms and frameworks -- A mobile-based attribute aggregation architecture for user-centric identity management Alexandre B. Augusto, Manuel E. Correia -- The Austrian identity ecosystem: an e-government experience Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer -- Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project Andrea Atzeni, John Lyle, Shamal Faily -- Securing XML with role-based access control: case study in health care Alberto De la Rosa Algarín, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sánchez, Robert Kuykendall.
Summary, Etc.  
요약"This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--해제Provided by publisher.
Subject Added Entry-Topical Term  
Information technology Security measures
Subject Added Entry-Topical Term  
Computer networks Security measures
Subject Added Entry-Topical Term  
COMPUTERS / Internet / Security.
Subject Added Entry-Topical Term  
COMPUTERS / Networking / Security.
Subject Added Entry-Topical Term  
COMPUTERS / Security / General.
Added Entry-Personal Name  
Martinez, Antonio Ruiz , 1976-
Added Entry-Personal Name  
Garcia, Fernando Pereniguez , 1984-
Added Entry-Personal Name  
Marin-Lopez, Rafael , 1977-
Additional Physical Form Entry  
Print version Architectures and protocols for secure information technology infrastructures. Hershey PA : Information Science Reference, an imprint of IGI Global, [2014] 9781466645141 (DLC) 2013020692 (OCoLC)843857015
Series Added Entry-Uniform Title  
Advances in information security, privacy, and ethics. 1948-9730
Electronic Location and Access  
로그인을 한후 보실 수 있는 자료입니다.
Control Number  
joongbu:422480

MARC

 008140102s2014        paua        ob        001  0  eng  d
■001                                        
■003OCoLC
■00520140127111319
■006m          o    d
■007cr  cnu---unuuu
■019    ▼a859298485
■020    ▼a9781466645158  (electronic  bk.)
■020    ▼a1466645156  (electronic  bk.)
■020    ▼z9781466645141
■020    ▼z1466645148
■020    ▼z9781466645165
■020    ▼z1466645164
■035    ▼a(OCoLC)855019703
■040    ▼aN$T▼beng▼epn▼cN$T▼dIDEBK▼dOCLCA▼dCDX▼dE7B▼dIGIGL▼dFTU▼dYDXCP▼dOCLCO
■050  4▼aQA76.9.A25▼bA73  2014
■072  7▼aCOM▼x060040▼2bisacsh
■072  7▼aCOM▼x043050▼2bisacsh
■072  7▼aCOM▼x053000▼2bisacsh
■08204▼a005.8▼223
■24500▼aArchitectures  and  protocols  for  secure  information  technology  infrastructures▼h[electronic  resource]▼dAntonio  Ruiz  Martínez,  Fernando  Pereñíguez  Garcia,  Rafael  Marin-López,  [editors]
■260    ▼aHershey  PA▼bInformation  Science  Reference,  an  imprint  of  IGI  Global▼cc2014
■300    ▼a1  online  resource  (xx,  405  p)  ▼bill.
■336    ▼atext▼btxt▼2rdacontent
■337    ▼acomputer▼bc▼2rdamedia
■338    ▼aonline  resource▼bcr▼2rdacarrier
■4900  ▼aPremier  reference  source
■4900  ▼aAdvances  in  Information  Security,  Privacy,  and  Ethics  (AISPE)▼x1948-9749
■504    ▼aIncludes  bibliographical  references  (p.  366-394)  and  index.
■50500▼gSect.  1.▼tState-of-the-art  --▼tSecurity  and  privacy  issues  in  cloud  computing▼rJaydip  Sen  --▼tTowards  a  certified  electronic  mail  system▼rGerard  Draper-Gil,  Josep-Lluís  Ferrer-Gomila,  M.  Francisca  Hinarejos,  Arne  Tauber  --▼tMobile  IPv6:  mobility  management  and  security  aspects▼rTayo  Arulogun,  Ahmad  AlSa'deh,  Christoph  Meinel  --▼gSect.  2.▼tCryptographic  algorithms  and  security  protocols  --▼tA  new  encryption  algorithm  based  on  chaotic  map  for  wireless  sensor  network▼rGhada  Zaibi,  Fabrice  Peyrard,  Abdennaceur  Kachouri,  Danièle  Fournier-Prunaret,  Mounir  Samet  --▼tA  polling  booth-based  electronic  voting  scheme▼rMd.  Abdul  Based  --▼tChallenges  and  solutions  for  DNS  security  in  IPv6▼rHosnieh  Rafiee,  Martin  von  Löwis,  Christoph  Meinel  --▼gSect.  3.▼tMalware  and  intrusion  detection  systems  --▼tHost-based  intrusion  detection  systems:  architectures,  solutions,  and  challenges▼rVít  Bukac,  Vashek  Matyáš  --▼tEnhancing  intrusion  detection  systems  using  intelligent  false  alarm  filter:  selecting  the  best  machine  learning  algorithm▼rYuxin  Meng,  Lam-For  Kwok  --▼tTowards  building  efficient  malware  detection  engines  using  hybrid  CPU/GPU-accelerated  approaches▼rCiprian  Pungila,  Viorel  Negru  --▼gSect.  4.▼tSecure  platforms  and  frameworks  --▼tA  mobile-based  attribute  aggregation  architecture  for  user-centric  identity  management▼rAlexandre  B.  Augusto,  Manuel  E.  Correia  --▼tThe  Austrian  identity  ecosystem:  an  e-government  experience▼rKlaus  Stranacher,  Arne  Tauber,  Thomas  Zefferer,  Bernd  Zwattendorfer  --▼tDeveloping  secure,  unified,  multi-device,  and  multi-domain  platforms:  a  case  study  from  the  Webinos  Project▼rAndrea  Atzeni,  John  Lyle,  Shamal  Faily  --▼tSecuring  XML  with  role-based  access  control:  case  study  in  health  care▼rAlberto  De  la  Rosa  Algarín,  Steven  A.  Demurjian,  Timoteus  B.  Ziminski,  Yaira  K.  Rivera  Sánchez,  Robert  Kuykendall.
■520    ▼a"This  book  investigates  different  protocols  and  architectures  that  can  be  used  to  design,  create,  and  develop  security  infrastructures  by  highlighting  recent  advances,  trends,  and  contributions  to  the  building  blocks  for  solving  security  issues"--▼cProvided  by  publisher.
■588    ▼aDescription  based  on  print  version  record  and  online  resource  ;  title  from  PDF  title  page  (EBSCOhost  eBook  Collection,  viewed  Oct.  17,  2013).
■650  0▼aInformation  technology▼xSecurity  measures
■650  0▼aComputer  networks▼xSecurity  measures
■650  7▼aCOMPUTERS  /  Internet  /  Security.▼2bisacsh
■650  7▼aCOMPUTERS  /  Networking  /  Security.▼2bisacsh
■650  7▼aCOMPUTERS  /  Security  /  General.▼2bisacsh
■7001  ▼aMartinez,  Antonio  Ruiz▼d1976-▼eeditor  of  compilation.
■7001  ▼aGarcia,  Fernando  Pereniguez▼d1984-▼eeditor  of  compilation.
■7001  ▼aMarin-Lopez,  Rafael▼d1977-▼eeditor  of  compilation.
■77608▼iPrint  version▼tArchitectures  and  protocols  for  secure  information  technology  infrastructures.▼dHershey  PA  :  Information  Science  Reference,  an  imprint  of  IGI  Global,  [2014]▼z9781466645141▼w(DLC)    2013020692▼w(OCoLC)843857015
■830  0▼aAdvances  in  information  security,  privacy,  and  ethics.▼x1948-9730
■85640▼3EBSCOhost▼uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=621904
■938    ▼aEBSCOhost▼bEBSC▼n621904
■938    ▼aIngram  Digital  eBook  Collection▼bIDEB▼ncis26005486
■938    ▼aCoutts  Information  Services▼bCOUT▼n26005486
■938    ▼aebrary▼bEBRY▼nebr10739999
■938    ▼aIGI  Global▼bIGIG▼n00076712
■938    ▼aYBP  Library  Services▼bYANK▼n10922801
■994    ▼a92▼bK4R
■999    ▼z635217623907107158

미리보기

내보내기

chatGPT토론

Ai 추천 관련 도서


    New Books MORE
    Related books MORE
    최근 3년간 통계입니다.

    ค้นหาข้อมูลรายละเอียด

    • จองห้องพัก
    • 캠퍼스간 도서대출
    • 서가에 없는 책 신고
    • โฟลเดอร์ของฉัน
    วัสดุ
    Reg No. Call No. ตำแหน่งที่ตั้ง สถานะ ยืมข้อมูล
    EW0009535 EB   원문자료 대출가능 대출가능
    마이폴더 부재도서신고

    * จองมีอยู่ในหนังสือยืม เพื่อให้การสำรองที่นั่งคลิกที่ปุ่มจองห้องพัก

    해당 도서를 다른 이용자가 함께 대출한 도서

    Related books

    Related Popular Books

    도서위치