• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Web services security and e-business /

پدید آورنده
G. Radhamani and G.S.V. Radha Krishna Rao, [editors].

موضوع
Computer networks-- Security measures.,Computer security.,Electronic commerce-- Security measures.,Web services.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic commerce-- Security measures.,Web services.

رده
TK5105
.
59
.
W434
2007

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1599041707
(Number (ISBN
9781599041704
Erroneous ISBN
1599041685
Erroneous ISBN
1599041693
Erroneous ISBN
9781599041681
Erroneous ISBN
9781599041698

NATIONAL BIBLIOGRAPHY NUMBER

Number
b758970

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Web services security and e-business /
General Material Designation
[Book]
First Statement of Responsibility
G. Radhamani and G.S.V. Radha Krishna Rao, [editors].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Hershey, PA :
Name of Publisher, Distributor, etc.
Idea Group Pub.,
Date of Publication, Distribution, etc.
©2007.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (394 pages) :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Wireless LAN setup and security loopholes / Biju Issac and Lawan A. Mohammed -- Wireless web security using a neural network-based cipher / Isaac Woungang [and others] -- RFID systems: applications versus security and privacy implications / Dennis M.L. Wong and Raphael C.-W. Phan -- Mobile code and security issues / E.S. Samundeeswari and F. Mary Magdalene Jane -- A survey of key generation for secure multicast communication protocols / Win Aye and Mohammad Umar Siddiqi -- Security in mobile agent systems / Chua Fang Fang and G. Radhamani -- Intrusion detection system : a brief study / Robin Salim and G.S.V. Radha Krishna Rao -- Node authentication in networks using zero-knowledge proofs / Richard S. Norville, Kamesh Namuduri, and Ravi Pensde -- Web services security in e-business: attacks and countermeasures / Wei-Chuen Yau and G.S.V. Radha Krishna Rao -- Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues / R. Anitha and R.S. Sanakarasubramanian -- An introductory study on business intelligence security / Chan Gaik Yee and G.S.V. Radha Krishna Rao -- Secure trust transfer using chain signatures / Amitabh Saxena and Ben Soh -- Distributed intrusion detection systems : an overview / Rosalind Deena Kumari and G. Radhamani -- Subtle interactions: security protocols and cipher modes of operation / Raphael C.-W. Phan and Bok-Min Goi -- Generic algorithm for preparing unbreakable cipher : a short study / R.A. Balachandar, M. Bala Kumar, and S. Anil Kumar -- A robust watermarking scheme using codes based on the RRNS / Vik Tor Goh, and Mohammad Umar Siddiqi -- A framework for electronic bill presentment and offline message viewing / Ezmir Mohd Razali [and others] -- Propagation and delegation of rights in access controls & risk assessment techniques / Saravanan Muthaiyah -- IPSec overhead in dual stack IPv4/IPv6 transition mechanisms : an analytical study / M. Mujinga [and others] -- An approach for intentional modeling of web services security risk assessment / Subhas C. Misra, Vinod Kumar, Uma Kumar.
0

SUMMARY OR ABSTRACT

Text of Note
"This book provides an insight into uncovering the security risks of dynamically created content and looks at how proper content management can greatly improve the overall security. It also looks at the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing"--Provided by publisher.

SYSTEM REQUIREMENTS NOTE (ELECTRONIC RESOURCES)

Text of Note
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.

OTHER EDITION IN ANOTHER MEDIUM

Title
Web services security and e-business.
International Standard Book Number
1599041693

TOPICAL NAME USED AS SUBJECT

Computer networks-- Security measures.
Computer security.
Electronic commerce-- Security measures.
Web services.
Computer networks-- Security measures.
Computer security.
COMPUTERS-- Internet-- Security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
Electronic commerce-- Security measures.
Web services.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK5105
.
59
Book number
.
W434
2007

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Radha Krishna Rao, G. S. V.,1973-
Radhamani, G.,1968-

ORIGINATING SOURCE

Date of Transaction
20201204185441.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival