語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy management, tec...
~
Maleh, Yassine, (1987-)
Security and privacy management, techniques, and protocols
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and privacy management, techniques, and protocols/ Yassine Maleh, editor.
其他作者:
Maleh, Yassine,
出版者:
Hershey, Pennsylvania :IGI Global, : [2018],
面頁冊數:
1 online resource (xxi, 426 p.)
提要註:
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
標題:
Privacy, Right of. -
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
ISBN:
9781522555841 (ebook)
Security and privacy management, techniques, and protocols
Security and privacy management, techniques, and protocols
[electronic resource] /Yassine Maleh, editor. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (xxi, 426 p.)
Includes bibliographical references and index.
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
Restricted to subscribers or individual electronic text purchasers.
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
ISBN: 9781522555841 (ebook)Subjects--Topical Terms:
229583
Privacy, Right of.
LC Class. No.: TK5105.59 / .S439235 2018e
Dewey Class. No.: 005.8
Security and privacy management, techniques, and protocols
LDR
:03020nam a2200277 a 4500
001
314551
003
IGIG
005
20181030154020.0
006
m o d
007
cr cn
008
181108s2018 pau fob 001 0 eng d
010
$z
2017048268
020
$a
9781522555841 (ebook)
020
$a
9781522555834 (hardcover)
035
$a
(OCoLC)1028726766
035
$a
1071025340
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.S439235 2018e
082
0 4
$a
005.8
$2
23
245
0 0
$a
Security and privacy management, techniques, and protocols
$h
[electronic resource] /
$c
Yassine Maleh, editor.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (xxi, 426 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--
$c
Provided by publisher.
650
0
$2
96060
$a
Privacy, Right of.
$3
229583
650
0
$2
96060
$a
Computer networks
$x
Security measures.
$3
233826
700
1
$a
Maleh, Yassine,
$d
1987-
$e
editor.
$3
433637
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入