Network security attacks and countermeasures

This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection

Saved in:
Bibliographic Details
Other Authors: Kumar G., Dileep 1982- (Editor), Singh, Manoj Kumar 1972- (Editor), Jayanthi, M. K. 1976- (Editor)
Format: Book
Language:English
Published: Hershey, PA Information Science Reference, an imprint of IGI Global [2016]
©
Series:A volume in Advances in information security, privacy, and ethics (AISPE) book series
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 103472
003 MY-KLNDU
005 20241220041149.0
008 221104 20162016paua bi 001 0 eng d
020 |a 9781466687615 (hardcover) 
020 |z 9781466687622 (eBook) 
039 9 |a 202211041205  |b VLOAD  |c 201803051602  |d faezah  |c 201803021552  |d faezah  |y 201709211558  |z hasniza 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b .N489 2016 
245 0 0 |a Network security attacks and countermeasures  |c Dileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, editors 
264 1 |a Hershey, PA  |b Information Science Reference, an imprint of IGI Global  |c [2016] 
264 1 |c © 
300 |a xv, 357 pages  |b illustrations  |c 29 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a A volume in Advances in information security, privacy, and ethics (AISPE) book series  |x 1948-9730 
500 |a "Premier reference source" -- Book cover 
504 |a Includes bibliographical references and index 
505 0 |a Introduction to network security / C.V. Anchugam, K. Thangadurai -- Security issues in mobile wireless networks / Arif Sari -- Virtual private networks / Alok Vishwakarma -- Classification of network attacks and countermeasures of different attacks / C.V. Anchugam, K. Thangadurai -- Attacks in wireless sensor networks / George William Kibirige, Camilius A. Sanga -- Sensors network: in regard with the security aspect and counter measures / Mamta Bachani, Ahsan Memon, Faisal Karim Shaikh -- DDoS attacks and their types / Dileep Kumar -- Cluster-based countermeasures for DDoS attacks / Mohammad Jabed Morshed Chowdhury, Dileep Kumar G. -- Intrusion detection system (IDS) and their types / Manoranjan Pradhan, Chinmaya Kumar Nayak, Sateesh Kumar Pradhan -- Intrusion prevention system / Bijaya Kumar Panda, Manoranjan Pradhan, Sateesh Kumar Pradhan -- AdaBoost algorithm with single weak classifier in network intrusion detection / P. Natesan, P. Balasubramanie, G. Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda 
520 |a This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection 
592 |a IV-99734  |b 5/12/2017  |c RM 847.55  |h Yuha 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer crimes  |x Prevention 
700 1 |a Kumar G., Dileep  |d 1982-  |e editor 
700 1 |a Singh, Manoj Kumar  |d 1972-  |e editor 
700 1 |a Jayanthi, M. K.  |d 1976-  |e editor 
999 |a vtls000059278  |c 103472  |d 103472