An edition of Handbook of security and networks (2011)

Handbook of security and networks

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today



Download Options

Buy this book

Last edited by ImportBot
August 1, 2020 | History
An edition of Handbook of security and networks (2011)

Handbook of security and networks

This work doesn't have a description yet. Can you add one?

Publish Date
Publisher
World Scientific
Language
English
Pages
551

Buy this book

Previews available in: English

Edition Availability
Cover of: Handbook of Security and Networks
Handbook of Security and Networks
2011, World Scientific Publishing Co Pte Ltd
in English
Cover of: Handbook of security and networks
Handbook of security and networks
2011, World Scientific
in English

Add another edition?

Book Details


Table of Contents

Security in wireless data networks / Abdel Karim Al Tamimi and Raj Jain
Enabling information confidentiality in publish/subscribe overlay networks / Hui Zhang ... [et al.]
Security enhancement of network protocol RFCs / Prabhaker Mateti and Venkat Pothamsetty and Benjamin Murray
Authentication of scalable multimedia streams / Mohamed Hefeeda and Kianoosh Mokhtarian
Explaining system security issues to computer professionals / Prabhaker Mateti
Attacker traceback in mobile multi-hop networks / Yongjin Kim and Ahmend Helmy
Detecting DoS attacks and service violations in QoS-enabled networks / Mohamed Hefeeda and Ahsan Habib
Key establishment
secrecy, authentication and anonymity / Guomin Yang, Duncan S. Wong and Xiaotie Deng
Detecting misused keys in wireless sensor networks / Donggan Liu and Qi Dong
A survey of key revocation schemes in mobile ad Hoc Networks / Xinxin Fan and Guang Gong
Hardware controlled systematic approach to detect and prevent virus / Meikang Qui ... [et al.]
A mathematical view of self-replicating malware / Thomas M. Chen and Nasir Jamil
Worm propagation and interaction in mobile networks / Sapon Tanachaiwiwat and Ahmed Helmy
Windows rootkits a game of "hide and seek" / Sherri Sparks, Shawn Embleton and Cliff C. Zou
An overview of Bot Army technology and prospects / Martin R. Stytz and Sheila B. Banks
Performance of bridging algorithms in IEEE 802.15.3 multi-piconet networks / Jelena Mis ic , Muhi Ahmed Ibne Khair and Vojislav B. Mis ic
Authentication and billing for Wlan/cellular network interworking / Minghui Shi ... [et al.]
Construction of Fault-Tolerant virtual backbones in wireless networks / Donghyun Kim, Xinofeng Gao, Feng Zou and Weili Wu
Service IOT for Digital Right Management (DRM) / Whai-En Chen, Ting-Kai Huang and Chun-Chieh Wang
Patient privacy in healthcare wireless sensor networks / Jelena Mis ic and Vojuslav B. Mis ic
Security implementation in real wireless sensors: a review / Fei Hu, Nidhi Verma and Yang Xiao.

Edition Notes

Includes bibliographical references.

Published in
Hackensack, NJ

Classifications

Dewey Decimal Class
005.8
Library of Congress
TK5105.59 .H36 2011, TK5105.59, MLCM 2015/42696 (T)

The Physical Object

Pagination
xxi, 551 p. :
Number of pages
551

ID Numbers

Open Library
OL25560072M
Internet Archive
handbooksecurity00xiao
ISBN 10
9814273031
ISBN 13
9789814273039
LCCN
2011499007
OCLC/WorldCat
299716367

Community Reviews (0)

No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
August 1, 2020 Edited by ImportBot import existing book
July 29, 2014 Created by ImportBot import new book