Case studies in secure computing (Record no. 6570)

MARC details
000 -LEADER
fixed length control field 02657nam a2200277Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251113105949.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220909b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781482207064
037 ## - SOURCE OF ACQUISITION
Terms of availability Textual
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Language of cataloging eng
Transcribing agency CSL
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):(894) Q5
Assigning agency CSL
245 #0 - TITLE STATEMENT
Statement of responsibility, etc. / edited by BijuIssac and Nauman Israr
Title Case studies in secure computing
Remainder of title : Achievements and trends
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 478p.
Other physical details : ill.
500 ## - GENERAL NOTE
General note Index 457-478p.
520 ## - SUMMARY, ETC.
Summary, etc. In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.<br/>This book examines the growing security attacks and countermeasures in the stand-alone and networking worlds, along with other pertinent security issues. The many case studies capture a truly wide range of secure computing applications. Surveying the common elements in computer security attacks and defenses, the book:<br/>Describes the use of feature selection and fuzzy logic in a decision tree model for intrusion detection<br/>Introduces a set of common fuzzy-logic-based security risk estimation techniques with examples<br/>Proposes a secure authenticated multiple-key establishment protocol for wireless sensor networks<br/>Investigates various malicious activities associated with cloud computing and proposes some countermeasures<br/>Examines current and emerging security threats in long-term evolution backhaul and core networks<br/>Supplies a brief introduction to application-layer denial-of-service (DoS) attacks<br/>Illustrating the security challenges currently facing practitioners, this book presents powerful security solutions proposed by leading researchers in the field. The examination of the various case studies will help to develop the practical understanding required to stay one step ahead of the security threats on the horizon.<br/>This book will help those new to the field understand how to mitigate security threats. It will also help established practitioners fine-tune their approach to establishing robust and resilient security for next-generation computing systems.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
9 (RLIN) 851074
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Security measures
9 (RLIN) 851075
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
9 (RLIN) 851076
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Issac, Biju
Relator term editor
9 (RLIN) 851077
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Israr, Nauman
Relator term editor
9 (RLIN) 851078
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Classification part D65,8(B):(894) Q5
Koha item type Textual
Source of classification or shelving scheme Colon Classification (CC)
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Colon Classification (CC)     Central Science Library Central Science Library 2021-03-21 457, 19/03/2015, Limpid Book Service   D65,8(B):(894) Q5 SL1598318 2022-09-12 2022-09-12 Textual