Wireless LAN setup and security loopholes / Biju Issac and Lawan A. Mohammed -- Wireless web security using a neural network-based cipher / Isaac Woungang [and others] -- RFID systems: applications versus security and privacy implications / Dennis M.L. Wong and Raphael C.-W. Phan -- Mobile code and security issues / E.S. Samundeeswari and F. Mary Magdalene Jane -- A survey of key generation for secure multicast communication protocols / Win Aye and Mohammad Umar Siddiqi -- Security in mobile agent systems / Chua Fang Fang and G. Radhamani -- Intrusion detection system : a brief study / Robin Salim and G.S.V. Radha Krishna Rao -- Node authentication in networks using zero-knowledge proofs / Richard S. Norville, Kamesh Namuduri, and Ravi Pensde -- Web services security in e-business: attacks and countermeasures / Wei-Chuen Yau and G.S.V. Radha Krishna Rao -- Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha and R.S. Sanakarasubramanian -- An introductory study on business intelligence security / Chan Gaik Yee and G.S.V. Radha Krishna Rao -- Secure trust transfer using chain signatures / Amitabh Saxena and Ben Soh -- Distributed intrusion detection systems : an overview / Rosalind Deena Kumari and G. Radhamani -- Subtle interactions: security protocols and cipher modes of operation / Raphael C.-W. Phan and Bok-Min Goi -- Generic algorithm for preparing unbreakable cipher : a short study / R.A. Balachandar, M. Bala Kumar, and S. Anil Kumar -- A robust watermarking scheme using codes based on the RRNS / Vik Tor Goh, and Mohammad Umar Siddiqi -- A framework for electronic bill presentment and offline message viewing / Ezmir Mohd Razali [and others] -- Propagation and delegation of rights in access controls & risk assessment techniques / Saravanan Muthaiyah -- IPSec overhead in dual stack IPv4/IPv6 transition mechanisms : an analytical study / M. Mujinga [and others] -- An approach for intentional modeling of web services security risk assessment / Subhas C. Misra, Vinod Kumar, Uma Kumar.
0
SUMMARY OR ABSTRACT
Text of Note
"This book provides an insight into uncovering the security risks of dynamically created content and looks at how proper content management can greatly improve the overall security. It also looks at the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing"--Provided by publisher.
SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)
Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.