Handbook of research on threat detec...
Al-Hamami, Alaa Hussein (1948-)

 

  • Handbook of research on threat detection and countermeasures in network security
  • Record Type: Language materials, printed : monographic
    Secondary Intellectual Responsibility: al-SaadooGhossoon M. Waleed, 1969-
    Secondary Intellectual Responsibility: Al-HamamiAlaa Hussein, 1948-
    Secondary Intellectual Responsibility: IGI Global
    Description: PDFs (426 pages)illustrations. :
    Subject: Computer networks - Security measures. -
    Subject: Attack methods
    Subject: Authentication techniques
    Subject: Biometric security
    Subject: Cryptography techniques
    Subject: Cyber security
    Subject: Database protection
    Subject: Digital signatures
    Subject: Security simulation
    Subject: Steganography
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
    Notes: Content Type: text
    Summary: "This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
    ISBN: 9781466665842
    Content Note: Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad Crime profiling system / Hussein Zedan, Meshrif Alruily Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem Biometric security / Muzhir Shaban Al-Ani Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi The impact of big data on security / Mohammad Alaa Hussain Al-Hamami 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab Trust determination in wireless ad hoc networks / Hussein Al-Bahadili Security in mobile computing / Venus W. Samawi The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami Security in digital images: from information hiding perspective / Mohammed A. Otair.
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login