回首頁 到查詢結果 [ subject:"Privacy, Right of." ]

Security and privacy management, tec...
Maleh, Yassine, (1987-)

FindBook      Google Book      Amazon      博客來     
  • Security and privacy management, techniques, and protocols
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Security and privacy management, techniques, and protocols/ Yassine Maleh, editor.
    其他作者: Maleh, Yassine,
    出版者: Hershey, Pennsylvania :IGI Global, : [2018],
    面頁冊數: 1 online resource (xxi, 426 p.)
    內容註: Section 1. Security and privacy protocols and cryptographic algorithms. Chapter 1. A lightweight authentication and encryption protocol for secure communications between resource-limited devices without hardware modification: resource-limited device authentication ; Chapter 2. Trust-based analytical models for secure wireless sensor networks ; Chapter 3. Semantically secure classifiers for privacy preserving data mining ; Chapter 4. Building a maturity framework for information security governance through an empirical study in organizations -- Section 2. Security and privacy management and methods. Chapter 5. IT security risk management model for handling IT-related security incidents: the need for a new escalation approach ; Chapter 6. Security visualization extended review issues, classifications, validation methods, trends, extensions -- Section 3. E-health security management and methodologies. Chapter 7. Compliance of electronic health record applications with HIPAA security and privacy requirements ; Chapter 8. Standards and guides for implementing security and privacy for health information technology ; Chapter 9. A semiotic examination of the security policy lifecycle -- Section 4. Intrusion detection systems. Chapter 10. Intrusion detection systems alerts reduction: new approach for forensics readiness ; Chapter 11. Visualization technique for intrusion detection ; Chapter 12. False alarm reduction: a profiling mechanism and new research directions -- Section 5. Cyber security and malware. Chapter 13. Internet crime and anti-fraud activism: a hands-on approach ; Chapter 14. Metamorphic malware detection using minimal opcode statistical patterns ; Chapter 15. Classification of web-service-based attacks and mitigation techniques.
    標題: Computer networks - Security measures. -
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5583-4
    ISBN: 9781522555841 (ebook)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9344663 電子資源 11.線上閱覽_V 電子書 EB TK5105.59 .S439235 2018e 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入