語系/ Language: 繁體中文
回首頁 到查詢結果 [ subject:"Cryptography techniques" ]

Handbook of research on threat detec...
Al-Hamami, Alaa Hussein (1948-)

 

  • Handbook of research on threat detection and countermeasures in network security
  • 紀錄類型: 書目-語言資料,印刷品 : 單行本
    其他作者: al-SaadooGhossoon M. Waleed, 1969-
    其他作者: Al-HamamiAlaa Hussein, 1948-
    其他團體作者: IGI Global
    面頁冊數: PDFs (426 pages)illustrations. :
    標題: Computer networks - Security measures. -
    標題: Attack methods
    標題: Authentication techniques
    標題: Biometric security
    標題: Cryptography techniques
    標題: Cyber security
    標題: Database protection
    標題: Digital signatures
    標題: Security simulation
    標題: Steganography
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-6583-5
    附註: Content Type: text
    摘要註: "This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
    ISBN: 9781466665842
    內容註: Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad Crime profiling system / Hussein Zedan, Meshrif Alruily Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem Biometric security / Muzhir Shaban Al-Ani Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi The impact of big data on security / Mohammad Alaa Hussain Al-Hamami 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab Trust determination in wireless ad hoc networks / Hussein Al-Bahadili Security in mobile computing / Venus W. Samawi The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami Security in digital images: from information hiding perspective / Mohammed A. Otair.
多媒體
評論
  • 新增評論 分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
 
 
變更密碼
登入