Network security attacks and countermeasures
This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection
Saved in:
| Other Authors: | , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2016]
© |
| Series: | A volume in Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 103472 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220041149.0 | ||
| 008 | 221104 20162016paua bi 001 0 eng d | ||
| 020 | |a 9781466687615 (hardcover) | ||
| 020 | |z 9781466687622 (eBook) | ||
| 039 | 9 | |a 202211041205 |b VLOAD |c 201803051602 |d faezah |c 201803021552 |d faezah |y 201709211558 |z hasniza | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.59 |b .N489 2016 | ||
| 245 | 0 | 0 | |a Network security attacks and countermeasures |c Dileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, editors |
| 264 | 1 | |a Hershey, PA |b Information Science Reference, an imprint of IGI Global |c [2016] | |
| 264 | 1 | |c © | |
| 300 | |a xv, 357 pages |b illustrations |c 29 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a A volume in Advances in information security, privacy, and ethics (AISPE) book series |x 1948-9730 | |
| 500 | |a "Premier reference source" -- Book cover | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a Introduction to network security / C.V. Anchugam, K. Thangadurai -- Security issues in mobile wireless networks / Arif Sari -- Virtual private networks / Alok Vishwakarma -- Classification of network attacks and countermeasures of different attacks / C.V. Anchugam, K. Thangadurai -- Attacks in wireless sensor networks / George William Kibirige, Camilius A. Sanga -- Sensors network: in regard with the security aspect and counter measures / Mamta Bachani, Ahsan Memon, Faisal Karim Shaikh -- DDoS attacks and their types / Dileep Kumar -- Cluster-based countermeasures for DDoS attacks / Mohammad Jabed Morshed Chowdhury, Dileep Kumar G. -- Intrusion detection system (IDS) and their types / Manoranjan Pradhan, Chinmaya Kumar Nayak, Sateesh Kumar Pradhan -- Intrusion prevention system / Bijaya Kumar Panda, Manoranjan Pradhan, Sateesh Kumar Pradhan -- AdaBoost algorithm with single weak classifier in network intrusion detection / P. Natesan, P. Balasubramanie, G. Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda | |
| 520 | |a This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection | ||
| 592 | |a IV-99734 |b 5/12/2017 |c RM 847.55 |h Yuha | ||
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Computer crimes |x Prevention | |
| 700 | 1 | |a Kumar G., Dileep |d 1982- |e editor | |
| 700 | 1 | |a Singh, Manoj Kumar |d 1972- |e editor | |
| 700 | 1 | |a Jayanthi, M. K. |d 1976- |e editor | |
| 999 | |a vtls000059278 |c 103472 |d 103472 | ||


