000 03677cam a2200529Mi 4500
001 9781003034049
003 FlBoTFG
005 20220711212053.0
006 m o d
007 cr |||||||||||
008 201117s2021 flu fo 000 0 eng d
040 _aOCoLC-P
_beng
_erda
_epn
_cOCoLC-P
020 _a9781000285055
_q(e-book)
020 _a1000285057
020 _a9781003034049
_q(electronic bk.)
020 _a1003034047
_q(electronic bk.)
020 _a9781000285079
_q(electronic bk. : EPUB)
020 _a1000285073
_q(electronic bk. : EPUB)
020 _a9781000285062
_q(electronic bk. : Mobipocket)
020 _a1000285065
_q(electronic bk. : Mobipocket)
035 _a(OCoLC)1228889365
035 _a(OCoLC-P)1228889365
050 4 _aTK5105.59
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aUR
_2bicssc
082 0 4 _a005.8
_223
100 1 _aJeyanthi, N.,
_d1977-
_eauthor.
_912845
245 1 0 _aManaging security services in heterogenous networks
_bconfidentiality, integrity, availability, authentication, and access control /
_cN. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran.
264 1 _aBoca Raton :
_bCRC Press,
_c2021.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
520 _aA heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aComputer networks
_xSecurity measures
_xManagement.
_912846
650 0 _aHeterogeneous distributed computing systems.
_912847
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
_912848
650 7 _aCOMPUTERS / Security / General
_2bisacsh
_96769
700 1 _aMa, Kun
_c(Computer scientist),
_eauthor.
_912849
700 1 _aPerumal, Thinagaran,
_eauthor.
_912850
700 1 _aThandeeswaran, N.,
_eauthor.
_912851
856 4 0 _3Taylor & Francis
_uhttps://www.taylorfrancis.com/books/9781003034049
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _cEBK
999 _c70307
_d70307