Advances in security in computing and communications [electronic resource] / (Record no. 10646)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02716nam a22002177a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20191113171039.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 191113b ||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | UMI |
| Description conventions | RDA |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Edition number | 22 |
| Classification number | 005.8 |
| Item number | ADV |
| 245 ## - TITLE STATEMENT | |
| Title | Advances in security in computing and communications [electronic resource] / |
| Statement of responsibility, etc. | edited by Jaydip Sen. - |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc. | London : |
| Name of publisher, distributor, etc. | IntechOpen, |
| Date of publication, distribution, etc. | c2017. - |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | 1 online resource (8 chapters) : |
| Other physical details | illustrations. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Content: 1. Proactive Detection of Unknown Binary Executable Malware / by Eric Filiol. -- 2. Cloud Cyber Security: Finding an Effective Approach with Unikernels / by Bob Duncan, Andreas Happe and Alfred Bratterud. -- 3. Machine Learning in Application Security. -- by Nilaykumar Kiran Sangani and Haroot Zarger. -- 4. Advanced Access Control to Information Systems: Requirements, Compliance and Future Directives / by Faouzi Jaidi. -- 5. Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges / by Javier Franco Contreras and Gouenou Coatrieux. -- 6. Implementing Secure Key Coordination Scheme for Line Topology Wireless Sensor Networks / by Walid Elgenaidi, Thomas Newe, Eoin O’Connel, Muftah Fraifer, Avijit Mathur, Daniel Toal and Gerard Dooly. -- 7. Energy-Secrecy Trade-offs for Wireless Communication / by Ruolin Zhang. -- 8. Implementation of a Multimaps Chaos-Based Encryption Software for EEG Signals / by Chin-Feng Lin and Che-Wei Liu |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Summary: In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | 1. Computer security. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | 2. Information security |
| General subdivision | Electronic. |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Sen, Jaydip, |
| Relator term | editor. |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="https://www.intechopen.com/books/advances-in-security-in-computing-and-communications">https://www.intechopen.com/books/advances-in-security-in-computing-and-communications</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | E-Book |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Date last seen | Uniform Resource Identifier | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Item Still in Circulation | Dewey Decimal Classification | Non-fiction | UMI Main Library | UMI Main Library | 11/13/2019 | Online download | 005.8 ADV | 11/13/2019 | https://www.intechopen.com/books/advances-in-security-in-computing-and-communications | 11/13/2019 | E-Book | This book is available ONLINE only. Click on the URL to access and read the book. | ||||
| Item Still in Circulation | Dewey Decimal Classification | Non-fiction | UMI Main Library | UMI Main Library | 11/13/2019 | Online download | 005.8 ADV | 11/13/2019 | https://www.intechopen.com/books/advances-in-security-in-computing-and-communications | 11/13/2019 | E-Book | This book is available ONLINE only. Click on the URL to access and read the book. |
