An edition of Handbook of security and networks (2011)

Handbook of security and networks

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today



Download Options

Buy this book

Last edited by ImportBot
August 1, 2020 | History
An edition of Handbook of security and networks (2011)

Handbook of security and networks

This work doesn't have a description yet. Can you add one?

Publish Date
Publisher
World Scientific
Language
English
Pages
551

Buy this book

Previews available in: English

Edition Availability
Cover of: Handbook of security and networks
Handbook of security and networks
2011, World Scientific
in English
Cover of: Handbook of Security and Networks
Handbook of Security and Networks
2011, World Scientific Publishing Co Pte Ltd
in English

Add another edition?

Book Details


Table of Contents

Security in wireless data networks / Abdel Karim Al Tamimi and Raj Jain
Enabling information confidentiality in publish/subscribe overlay networks / Hui Zhang ... [et al.]
Security enhancement of network protocol RFCs / Prabhaker Mateti and Venkat Pothamsetty and Benjamin Murray
Authentication of scalable multimedia streams / Mohamed Hefeeda and Kianoosh Mokhtarian
Explaining system security issues to computer professionals / Prabhaker Mateti
Attacker traceback in mobile multi-hop networks / Yongjin Kim and Ahmend Helmy
Detecting DoS attacks and service violations in QoS-enabled networks / Mohamed Hefeeda and Ahsan Habib
Key establishment
secrecy, authentication and anonymity / Guomin Yang, Duncan S. Wong and Xiaotie Deng
Detecting misused keys in wireless sensor networks / Donggan Liu and Qi Dong
A survey of key revocation schemes in mobile ad Hoc Networks / Xinxin Fan and Guang Gong
Hardware controlled systematic approach to detect and prevent virus / Meikang Qui ... [et al.]
A mathematical view of self-replicating malware / Thomas M. Chen and Nasir Jamil
Worm propagation and interaction in mobile networks / Sapon Tanachaiwiwat and Ahmed Helmy
Windows rootkits a game of "hide and seek" / Sherri Sparks, Shawn Embleton and Cliff C. Zou
An overview of Bot Army technology and prospects / Martin R. Stytz and Sheila B. Banks
Performance of bridging algorithms in IEEE 802.15.3 multi-piconet networks / Jelena Mis ic , Muhi Ahmed Ibne Khair and Vojislav B. Mis ic
Authentication and billing for Wlan/cellular network interworking / Minghui Shi ... [et al.]
Construction of Fault-Tolerant virtual backbones in wireless networks / Donghyun Kim, Xinofeng Gao, Feng Zou and Weili Wu
Service IOT for Digital Right Management (DRM) / Whai-En Chen, Ting-Kai Huang and Chun-Chieh Wang
Patient privacy in healthcare wireless sensor networks / Jelena Mis ic and Vojuslav B. Mis ic
Security implementation in real wireless sensors: a review / Fei Hu, Nidhi Verma and Yang Xiao.

Edition Notes

Includes bibliographical references.

Published in
Hackensack, NJ

Classifications

Dewey Decimal Class
005.8
Library of Congress
TK5105.59 .H36 2011, TK5105.59, MLCM 2015/42696 (T)

The Physical Object

Pagination
xxi, 551 p. :
Number of pages
551

ID Numbers

Open Library
OL25560072M
Internet Archive
handbooksecurity00xiao
ISBN 10
9814273031
ISBN 13
9789814273039
LCCN
2011499007
OCLC/WorldCat
299716367

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 1, 2020 Edited by ImportBot import existing book
July 29, 2014 Created by ImportBot import new book