logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cyber Security: Proceedings of Csi 2015

Cyber Security: Proceedings of Csi 2015 (Paperback, 2018)

M. U. Bokhari, Namrata Agrawal, Dharmendra Saini (엮은이)
  |  
Springer
2018-04-28
  |  
182,480원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
알라딘 149,630원 -18% 0원 7,490원 142,140원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
로딩중

e-Book

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

해외직구

책 이미지

Cyber Security: Proceedings of Csi 2015

책 정보

· 제목 : Cyber Security: Proceedings of Csi 2015 (Paperback, 2018) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9789811085352
· 쪽수 : 505쪽

목차

Privacy Protection Through Hiding Location Coordinates Using Geometric Transformation Techniques in Location Based Services Enabled Mobiles.- Advanced RSA Cryptographic Algorithm for Improving Data Security.- Different Security Mechanisms in Two Factor Authentication for Collaborative Computing Environment.- Changing Trend in Network Security Measures: A Review.- An Improved RED Algorithm with Input Sensitivity.- Security Attacks in Wireless Sensor Networks: A Survey.- Symmetric Key Encryption Technique: A Cellular Automata Based Approach.- A Comparative study on Lightweight Cryptography.- GPS Hash Table Based Location Identifier Algorithm For Security and Integrity Against Vampire Attacks.- Data Security Model in Cloud Computing Environment.- Review of CIDS and Techniques of Detection of Malicious Insiders in Cloud Based Environment.- DNA Based Cryptography for Security in Wireless Sensor Networks.- Privacy Preservation Using Various Anonymity Models.- A Hybrid Security Mechanism Based on DCT and Visual Cryptography for Data Communication Networks.- An Advanced Dynamic Authentic Security Method for Cloud Computing.- Security in CryptDB Using Fine Grained Access Controls with ECDHE-ZeroVi's Framework.- Mitigating Cloud Security Threats Using Public Key Infrastructure.- Analysis and Impact of Different Mechanisms of Defending Pass the Hash Attacks.- Data Security and Encryption Technique for Cloud Storage.- Fine Grained Access Control and Secured Data Sharing in Cloud Computing.- Comparative Study of Security Risk in Social Networking and Awareness to Individual.- A Key Based Spiral Approach for DNA Cryptography.- Permission-Set Based Detection and Analysis of Android Malware.- Three Level GIS Data Security: Conjointly Cryptography and Digital Watermarking.- Digital Security an Enigma.- ICMP Flood Attacks: A Vulnerability Analysis.- Statistical Approach Using Meta Features for Android Malware Detection System.- Composite Email Features for Spam Identification.- Role of Multiple Encryption in Biometric Devices.- Buffer Overflow and SQL Injection: To Remotely Attack and Access Information.- Prime Numbers: Foundation of Cryptography.- Steganography: A Survey.- Comprehensive Methodology for Threat Identification and Vulnerability Assessment in Ad-hoc Networks.- Hardware Trojans: An Austere Menace Ahead.- Cyber Security for Supervisory Control and Data Acquisition.- k Barrier Coverage Based Intrusion Detection for Wireless Sensor Networks.- Performance Analysis of Vulnerability Detection Scanners for Web Systems.- Performance Evaluation of Multicast Source Authentication Scheme.- Design and Implementation of a Secure Hierarchical Trust Model for PKI.- Encryption and Decryption Technique Using Java.- Detection and Removal of Security Attacks Using ALARM Protocol in WSN Environment.- Encryption Technique Using Elliptic Curve Cryptography Through Compression and Artificial Intelligence.- A Robust Server-Side JavaScript Feature Injection-Based Design for JSP Web Applications Against XSS Vulnerabilities.- PHISH-SAFE: URL Features Based Phishing Detection System Using Machine Learning.- Semantic Security for Sharing Computing Knowledge/Information.- Paradigmatic Approach to Cloud Security: Challenges and Remedies.- The Digital Signature Schemes Based on Two Hard Problems: Factorization and Discrete Logarithm.- Gaussian Tendencies in Data Flow in Communication Links.

저자소개

M. U. Bokhari (엮은이)    정보 더보기
펼치기
Namrata Agrawal (엮은이)    정보 더보기
펼치기
Dharmendra Saini (엮은이)    정보 더보기
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책