یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Wireless LAN setup and security loopholes / Biju Issac and Lawan A. Mohammed -- Wireless web security using a neural network-based cipher / Isaac Woungang [and others] -- RFID systems: applications versus security and privacy implications / Dennis M.L. Wong and Raphael C.-W. Phan -- Mobile code and security issues / E.S. Samundeeswari and F. Mary Magdalene Jane -- A survey of key generation for secure multicast communication protocols / Win Aye and Mohammad Umar Siddiqi -- Security in mobile agent systems / Chua Fang Fang and G. Radhamani -- Intrusion detection system : a brief study / Robin Salim and G.S.V. Radha Krishna Rao -- Node authentication in networks using zero-knowledge proofs / Richard S. Norville, Kamesh Namuduri, and Ravi Pensde -- Web services security in e-business: attacks and countermeasures / Wei-Chuen Yau and G.S.V. Radha Krishna Rao -- Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha and R.S. Sanakarasubramanian -- An introductory study on business intelligence security / Chan Gaik Yee and G.S.V. Radha Krishna Rao -- Secure trust transfer using chain signatures / Amitabh Saxena and Ben Soh -- Distributed intrusion detection systems : an overview / Rosalind Deena Kumari and G. Radhamani -- Subtle interactions: security protocols and cipher modes of operation / Raphael C.-W. Phan and Bok-Min Goi -- Generic algorithm for preparing unbreakable cipher : a short study / R.A. Balachandar, M. Bala Kumar, and S. Anil Kumar -- A robust watermarking scheme using codes based on the RRNS / Vik Tor Goh, and Mohammad Umar Siddiqi -- A framework for electronic bill presentment and offline message viewing / Ezmir Mohd Razali [and others] -- Propagation and delegation of rights in access controls & risk assessment techniques / Saravanan Muthaiyah -- IPSec overhead in dual stack IPv4/IPv6 transition mechanisms : an analytical study / M. Mujinga [and others] -- An approach for intentional modeling of web services security risk assessment / Subhas C. Misra, Vinod Kumar, Uma Kumar.
بدون عنوان
0
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"This book provides an insight into uncovering the security risks of dynamically created content and looks at how proper content management can greatly improve the overall security. It also looks at the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing"--Provided by publisher.
یادداشتهای مربوط به نیازمندی های سیستم (منابع الکترونیک)و جزئیات فنی
متن يادداشت
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.