000 | 02641nam a22002897a 4500 | ||
---|---|---|---|
003 | AUA.1 | ||
005 | 20180211112505.0 | ||
008 | 180211b xxu||||| |||| 00| 0 eng d | ||
020 | _a9781466687615 (hardcover) | ||
040 | _cJTL | ||
050 |
_aTK5105.59 _b.N3377 2016 |
||
245 |
_aNetwork security attacks and countermeasures / _cDileep Kumar G., Manoj Kumar Singh, and M.K. Jayanthi, editors. |
||
260 |
_aHershey, PA : _bInformation Science Reference, _c[2016] c2016. |
||
300 |
_axv, 357 p. : _b ill. ; _c29 cm. |
||
440 | _aAdvances in information security, privacy, and ethics (AISPE) book series. | ||
500 | _aPremier Reference Source | ||
504 | _aIncludes bibliographical references and index. | ||
505 | _a Introduction to network security / C. V. Anchugam, K. Thangadurai -- Security Issues in mobile wireless networks / Arif Sari -- Virtual private networks / Alok Vishwakarma -- Classification of network attacks and countermeasures of different attacks / C. V. Anchugam, K. Thangadurai -- Attacks in wireless sensor networks / George William Kibirige, Camilius A. Sanga -- Sensors network: in regard with the security aspect and counter measures / Mamta Bachani, Ahsan Memon, Faisal Karim Shaikh -- DDoS attacks and their types / Dileep Kumar -- Cluster-based countermeasures for DDoS attacks / Mohammad Jabed Morshed Chowdhury, Dileep Kumar G -- Intrusion detection system (IDS) and their types / Manoranjan Pradhan, Chinmaya Kumar Nayak, Sateesh Kumar Pradhan -- Intrusion prevention system / Bijaya Kumar Panda, Manoranjan Pradhan, Sateesh Kumar Pradhan -- AdaBoost algorithm with single weak classifier in network intrusion detection / P. Natesan, P. Balasubramanie, G. Gowrison -- Countering RSA vulnerabilities and its replacement by ECC: elliptic curve cryptographic scheme for key generation / Behnam Rahnama, Arif Sari, Marwan Yassin Ghafour -- Changing dynamics of network security involving hacking/cracking with next generation firewalls (NGFW) / Alok Vishwakarma, Wafa Waheeda S. | ||
520 | _a"This book discusses the security and optimization of computer networks for use in a variety of disciplines and fields, touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection"-- Provided by publisher. | ||
650 |
_aComputer networks _xSecurity measures. |
||
650 |
_aComputer crimes _xPrevention. |
||
650 |
_aCOMPUTERS/Internet _xSecurity. |
||
700 |
_aKumar G., Dileep, _d1982- _eed. |
||
700 |
_aJayanthi, M. K., _d1976- _eed. |
||
700 |
_aSingh, Manoj Kumar, _d1972- _eed. |
||
942 |
_2lcc _cBOOK _hTK 5105.59 _i.N3377 2016 |
||
999 |
_c19321 _d19321 |