Managing security services in heterogenous networks (Record no. 70307)

000 -LEADER
fixed length control field 03677cam a2200529Mi 4500
001 - CONTROL NUMBER
control field 9781003034049
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212053.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 201117s2021 flu fo 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000285055
-- (e-book)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000285057
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781003034049
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1003034047
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000285079
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000285073
-- (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781000285062
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1000285065
-- (electronic bk. : Mobipocket)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
100 1# - AUTHOR NAME
Author Jeyanthi, N.,
245 10 - TITLE STATEMENT
Title Managing security services in heterogenous networks
Sub Title confidentiality, integrity, availability, authentication, and access control /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
520 ## - SUMMARY, ETC.
Summary, etc A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures
-- Management.
700 1# - AUTHOR 2
Author 2 Ma, Kun
700 1# - AUTHOR 2
Author 2 Perumal, Thinagaran,
700 1# - AUTHOR 2
Author 2 Thandeeswaran, N.,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781003034049
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton :
-- CRC Press,
-- 2021.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Heterogeneous distributed computing systems.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Networking / Security
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Security / General

No items available.