자료유형 | E-Book |
---|---|
개인저자 | Martinez, Antonio Ruiz, 1976-, editor of compilation. Garcia, Fernando Pereniguez, 1984-, editor of compilation. Marin-Lopez, Rafael, 1977-, editor of compilation. |
서명/저자사항 | Architectures and protocols for secure information technology infrastructures[electronic resource] /Antonio Ruiz Marti?nez, Fernando Peren?i?guez Garcia, Rafael Marin-Lo?pez, [editors]. |
발행사항 | Hershey PA : Information Science Reference, an imprint of IGI Global, c2014. |
형태사항 | 1 online resource (xx, 405 p.) : ill. |
총서사항 | Premier reference source Advances in Information Security, Privacy, and Ethics (AISPE),1948-9749 |
ISBN | 9781466645158 (electronic bk.) 1466645156 (electronic bk.) |
서지주기 | Includes bibliographical references (p. 366-394) and index. |
내용주기 | Sect. 1.State-of-the-art --Security and privacy issues in cloud computing /Jaydip Sen --Towards a certified electronic mail system /Gerard Draper-Gil, Josep-Llui?s Ferrer-Gomila, M. Francisca Hinarejos, Arne Tauber --Mobile IPv6: mobility management and security aspects /Tayo Arulogun, Ahmad AlSa'deh, Christoph Meinel --Sect. 2.Cryptographic algorithms and security protocols --A new encryption algorithm based on chaotic map for wireless sensor network /Ghada Zaibi, Fabrice Peyrard, Abdennaceur Kachouri, Danie?le Fournier-Prunaret, Mounir Samet --A polling booth-based electronic voting scheme /Md. Abdul Based --Challenges and solutions for DNS security in IPv6 /Hosnieh Rafiee, Martin von Lo?wis, Christoph Meinel --Sect. 3.Malware and intrusion detection systems --Host-based intrusion detection systems: architectures, solutions, and challenges /Vi?t Bukac, Vashek Matya?s? --Enhancing intrusion detection systems using intelligent false alarm filter: selecting the best machine learning algorithm /Yuxin Meng, Lam-For Kwok --Towards building efficient malware detection engines using hybrid CPU/GPU-accelerated approaches /Ciprian Pungila, Viorel Negru --Sect. 4.Secure platforms and frameworks --A mobile-based attribute aggregation architecture for user-centric identity management /Alexandre B. Augusto, Manuel E. Correia --The Austrian identity ecosystem: an e-government experience /Klaus Stranacher, Arne Tauber, Thomas Zefferer, Bernd Zwattendorfer --Developing secure, unified, multi-device, and multi-domain platforms: a case study from the Webinos Project /Andrea Atzeni, John Lyle, Shamal Faily --Securing XML with role-based access control: case study in health care /Alberto De la Rosa Algari?n, Steven A. Demurjian, Timoteus B. Ziminski, Yaira K. Rivera Sa?nchez, Robert Kuykendall. |
요약 | "This book investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues"-- |
일반주제명 | Information technology -- Security measures. Computer networks -- Security measures. COMPUTERS / Internet / Security. COMPUTERS / Networking / Security. COMPUTERS / Security / General. |
언어 | 영어 |
기타형태 저록 | Print version:Architectures and protocols for secure information technology infrastructures.Hershey PA : Information Science Reference, an imprint of IGI Global, [2014]9781466645141 |
대출바로가기 | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=621904 |
인쇄
No. | 등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 예약 | 서비스 | 매체정보 |
---|---|---|---|---|---|---|---|---|
1 | WE00001941 | 005.8 | 가야대학교/전자책서버(컴퓨터서버)/ | 대출가능 |