Security and privacy management, techniques, and protocols

"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--

Saved in:
Bibliographic Details
Other Authors: Maleh, Yassine 1987 (Editor)
Format: Book
Language:English
Published: Hershey PA IGI Global, 2018
Series:Advances in information security, privacy, and ethics (AISPE) Book Series,
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 91122
003 MY-KLNDU
005 20241220003154.0
008 220815 20182018xxu b 001 0 eng d
020 |a 9781522555834 (hbk) 
020 |a 9781522555841 (ebk) 
039 9 |a 202301101446  |b hainim  |y 202208150914  |z dewi 
040 |a MY-KlNDU  |b eng  |c MY-KlNDU  |e rda 
050 |a TK 5105.59  |b .S439235 2018 
090 |a TK 5105.59  |b .S439235 2018 
245 1 0 |a Security and privacy management, techniques, and protocols  |c Yassine Maleh, University Hassan I, Morrocco 
264 1 |a Hershey PA  |b IGI Global,  |c 2018 
264 4 |a © 2018 
300 |a xxi, 426 pages  |b illustrations (some)  |c 29 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
490 1 |a Advances in information security, privacy, and ethics (AISPE) Book Series,  |x 1948-9730X 
500 |a "Premier reference source"--Cover 
504 |a Includes bibliographical references and index 
505 0 |a A lightweight authentication & encryption protocol for secure communications between resource limited devices without hardware modification : resource limited device authentication / Piotr Ksiazak, Letterkenny Institute of Technology, Ireland, Kevin Curran, Ulster University, United Kingdom -- Role of cryptography in security / Sarvesh Tanwar, Mody University of Science and Technology, Lakshmangarh, India, Anil Kumar, Mody University of Science & Technology, India -- Risk assessment in virtualization / Dev Pandey, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalaya, India, Bharat Mishra, Mahatma Gandhi Chitrakoot Gramodaya Vishwavidyalya, India -- Metamorphic malware detection using minimal opcode statistical patterns / Mahmood Fazlali, Shahid Beheshti University, Iran, Islamic Republic of Iran -- False alarm reduction : a profiling mechanism and new research directions / Salima Hacini, Constantine University, Algeria, Zahia Guessoum, Pierre et Marie Curie University, France, Mohamed Cheikh, Lire Laboratory, Constantine2 University, Algeria -- Trust-based analytical models for secure wireless sensor networks / Aminu Usman, Auckland University of Technology, Nigeria, Jairo Gutierrez, Auckland University of Technology, New Zealand, New Zealand -- Intrusion detection systems alerts reduction new approach for forensics readiness / Aymen Akremi, Umm Al-Qura University, Saudi Arabia, Hassen Sallay, Umm Al-Qura University, Saudi Arabia, Mohsen Rouached, Sultanate Qabus University, Oman -- Security visualization extended review issues,classifications, validation methods,trends, extensions / Ferda Özdemir Sönmez, Middle East Technical University, Turkey, Banu Günel, Middle East Technical University, Turkey 
520 |a "This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethical and human aspects of information security and privacy"--  |c Provided by publisher 
592 |a IV-101730  |b 07/10/2022  |c RM874.00  |h YUHA Associates Sdn. Bhd 
650 0 |a Computer networks  |x Security measures 
650 0 |a Privacy, Right of 
700 1 |a Maleh, Yassine  |d 1987  |e editor 
830 0 |a Advances in information security, privacy, and ethics (AISPE) Book Series,  |x 1948-9730X 
999 |a vtls000103835  |c 91122  |d 91122