ShopSpell

Computer and Network Security Essentials [Hardcover]

$155.99     $199.99   22% Off     (Free Shipping)
100 available
  • Category: Books (Technology &Amp; Engineering)
  • ISBN-10:  3319584235
  • ISBN-10:  3319584235
  • ISBN-13:  9783319584232
  • ISBN-13:  9783319584232
  • Publisher:  Springer
  • Publisher:  Springer
  • Binding:  Hardcover
  • Binding:  Hardcover
  • Pub Date:  01-Apr-2017
  • Pub Date:  01-Apr-2017
  • SKU:  3319584235-11-SPRI
  • SKU:  3319584235-11-SPRI
  • Item ID: 100744310
  • List Price: $199.99
  • Seller: ShopSpell
  • Ships in: 5 business days
  • Transit time: Up to 5 business days
  • Delivery by: Nov 30 to Dec 02
  • Notes: Brand New Book. Order Now.

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers. Complementary slides are available for download on the books website at Springer.com.

Part I.COMPUTER SECURITY.- Chapter 1.Computer Security.- Chapter 2.A Survey and Taxonomy of Classifiers of Intrusion Detection Systems.- Chapter 3.A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics.- Chapter 4.Information-theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.- Chapter 5.A Postmortem Forensic Analysis for a JavaScript Based Attack.- Part II. NETWORK SECURITY.- Chapter 6.Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.- Chapter 7. A Survey and Taxonomy on Data and Pre-processing Techniques of Intrusion Detection Systems.- Chapter 8. Security protocols for networks and Internet: A global vision.- Chapter 9. Differentiating Security from Privacy in Internet of ThingsA Survey of Threats and Solutions.- Chapter 10. Reliable Transmission Protocol for Underwater Acoustic Networks.- Chapter 11. Using Sports Plays to Congure Honeypots Environments to form lă*