Language:
English
繁體中文
KMU OLIS
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Handbook of research on threat detec...
~
Al-Hamami, Alaa Hussein (1948-)
Handbook of research on threat detection and countermeasures in network security
Record Type:
Language materials, printed : monographic
Secondary Intellectual Responsibility:
al-SaadooGhossoon M. Waleed, 1969-
Secondary Intellectual Responsibility:
Al-HamamiAlaa Hussein, 1948-
Secondary Intellectual Responsibility:
IGI Global
Description:
PDFs (426 pages)illustrations. :
Subject:
Computer networks - Security measures. -
Subject:
Attack methods
Subject:
Authentication techniques
Subject:
Biometric security
Subject:
Cryptography techniques
Subject:
Cyber security
Subject:
Database protection
Subject:
Digital signatures
Subject:
Security simulation
Subject:
Steganography
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
Notes:
Content Type: text
Summary:
"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
ISBN:
9781466665842
Content Note:
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad Crime profiling system / Hussein Zedan, Meshrif Alruily Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem Biometric security / Muzhir Shaban Al-Ani Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi The impact of big data on security / Mohammad Alaa Hussain Al-Hamami 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab Trust determination in wireless ad hoc networks / Hussein Al-Bahadili Security in mobile computing / Venus W. Samawi The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami Security in digital images: from information hiding perspective / Mohammed A. Otair.
Handbook of research on threat detection and countermeasures in network security
Handbook of research on threat detection and countermeasures in network security
/ Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors. - PDFs (426 pages) ; illustrations..
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon.
Content Type: textMedia type: electronicCarrier type: online resourceRestricted to subscribers or individual electronic text purchasers..
Includes bibliographical references and index..
ISBN 9781466665842ISBN 9781466665835ISBN 9781466665866
Computer networks -- Security measures.
Attack methodsAuthentication techniquesBiometric securityCryptography techniquesCyber securityDatabase protectionDigital signaturesSecurity simulationSteganography
al-Saadoo, Ghossoon M. Waleed
Handbook of research on threat detection and countermeasures in network security
LDR
:03941nam a2200481 450
001
288670
005
20150520112536.0
009
a(CaBNVSL)gtp00562796
009
a(OCoLC)908145817
009
00000239
010
1
$a
9781466665842
$b
ebook
010
1
$a
9781466665835
010
1
$a
9781466665866
012
0
$a
10.4018/978-1-4666-6583-5
020
$b
2014029335
100
$a
20151127d2015 y0engy50 b
102
$a
us
105
$a
a a 001yy
200
1
$a
Handbook of research on threat detection and countermeasures in network security
$f
Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors.
215
1
$a
PDFs (426 pages)
$c
illustrations.
300
$a
Content Type: text
300
$a
Media type: electronic
300
$a
Carrier type: online resource
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-6583-5
310
$a
Also available in print.
320
$a
Includes bibliographical references and index.
327
1
$a
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
$a
Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem
$a
Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon
$a
Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef
$a
Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani
$a
Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad
$a
Crime profiling system / Hussein Zedan, Meshrif Alruily
$a
Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami
$a
Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy
$a
Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem
$a
Biometric security / Muzhir Shaban Al-Ani
$a
Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi
$a
Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa
$a
Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi
$a
The impact of big data on security / Mohammad Alaa Hussain Al-Hamami
$a
16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan
$a
A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab
$a
Trust determination in wireless ad hoc networks / Hussein Al-Bahadili
$a
Security in mobile computing / Venus W. Samawi
$a
The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami
$a
Security in digital images: from information hiding perspective / Mohammed A. Otair.
330
$a
"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2014029335
452
1
$1
300
$a
Print version:
$1
001(DLC) 2014029335
$1
0101
$a
1466665831; 9781466665835
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
610
1
$a
Attack methods
610
1
$a
Authentication techniques
610
1
$a
Biometric security
610
1
$a
Cryptography techniques
610
1
$a
Cyber security
610
1
$a
Database protection
610
1
$a
Digital signatures
610
1
$a
Security simulation
610
1
$a
Steganography
676
$a
005.8
$v
23
680
$a
TK5105.59
$b
.A393 2015e
702
1
$a
al-Saadoo
$b
Ghossoon M. Waleed
$f
1969-
$4
editor.
$3
385137
702
1
$a
Al-Hamami
$b
Alaa Hussein
$f
1948-
$4
editor.
$3
385136
712
0 2
$a
IGI Global
$4
publisher.
$3
384552
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login