語系/ Language: 繁體中文
回首頁 到查詢結果 [ subject:"Information technology- Security measures." ]

Architectures and protocols for secu...
IGI Global.

 

  • Architectures and protocols for secure information technology infrastructures
  • 紀錄類型: 書目-語言資料,印刷品 : 單行本
    其他作者: GarciaFernando Pereniguez, 1984-
    其他作者: Marin-LopezRafael, 1977-
    其他作者: MartinezAntonio Ruiz, 1976-
    其他團體作者: IGI Global.
    面頁冊數: PDFs (365 pages)illustrations. :
    標題: Computer networks - Security measures. -
    標題: Information technology - Security measures. -
    標題: Access control
    標題: Anonymous communications and services
    標題: Content distribution
    標題: Mobile/Embedded systems
    標題: RFID
    標題: Secure protocols
    標題: Security architectures
    標題: Security modeling and vulnerability analysis
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-4514-1
    附註: Content Type: text
    摘要註: "This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"--Provided by publisher.
    ISBN: 9781466645158
    內容註: Security and privacy issues in cloud computing / Jaydip Sen Towards a certified electronic mail system / Gerard Draper-Gil, Josep-Lluis Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber Mobile IPv6: mobility management and security aspects / Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel A new encryption algorithm based on chaotic map for wireless sensor network / Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danièle Fournier-Prunaret, Mounir Samet A polling booth-based electronic voting scheme / Md. Abdul Based Challenges and solutions for DNS security in IPv6 / Hosnieh Rafiee, Martin von Löwis, Christoph Meinel Host-based intrusion detection systems: architectures, solutions, and challenges / Vit Bukac, Vashek Matyaš Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm / Yuxin Meng, Lam-For Kwok Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches / Ciprian Pungila, Viorel Negru A mobile-based attribute aggregation architecture for user-centric identity management / Alexandre B. Augusto, Manuel E. Correia The Austrian identity ecosystem: an e-government experience / Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project / Andrea Atzeni, John Lyle, Shamal Faily Securing XML with role-based access control: case study in health care / Alberto De la Rosa Algarin, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sanchez, Robert Kuykendall.
多媒體
評論
  • 新增評論 分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
 
 
變更密碼
登入