Atnaujinkite slapukų nuostatas

Handbook of Research on Threat Detection and Countermeasures in Network Security [Kietas viršelis]

Kitos knygos pagal šią temą:
Kitos knygos pagal šią temą:
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community.

Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.
Preface xix
Acknowledgment xxiv
Chapter 1 Security Concepts, Developments, and Future Trends
1(16)
Alaa Hussein Al-Hamami
Ghossoon M. Waleed Al-Saadoon
Chapter 2 Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection
17(16)
Soukaena Hassan Hashem
Chapter 3 Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat
33(15)
Ghossoon M. Waleed Al-Saadoon
Chapter 4 Real Time Internal Intrusion Detection: A Case Study of Embedded Sensors and Detectors in E-Government Websites
48(18)
Zuhoor Al-Khanjari
Asaad Abdulrahman Nayyef
Chapter 5 Authentication Model for Enterprise Resource Planning Network
66(14)
Wasim A. Al-Hamdani
Chapter 6 Cryptographic Hash Function: A High Level View
80(15)
Imad Fakhri Alshaikhli
Mohammad Abdulateef AlAhmad
Chapter 7 Crime Profiling System
95(44)
Hussein Zedan
Meshrif Alruily
Chapter 8 Proposals to Win the Battle Against Cyber Crime
139(15)
Alaa Hussein Al-Hamami
Chapter 9 Cyber Crimes: Types, Sizes, Defence Mechanism, and Risk Mitigation
154(15)
Hasan L. Al-Saedy
Chapter 10 Cyber Space Security Assessment Case Study
169(30)
Hanaa M. Said
Rania El Gohary
Mohamed Hamdy
Abdelbadeeh M. Salem
Chapter 11 Biometric Security
199(19)
Muzhir Shaban Al-Ani
Chapter 12 Data Hiding Schemes Based on Singular Value Decomposition
218(24)
Nidhal Khdhair El Abbadi
Chapter 13 Malay Language Text-Based Anti-Spam System Using Neural Network
242(12)
Hamid A. Jalab
Thamarai Subramaniam
Alaa Y. Taqa
Chapter 14 Virtualization Technology and Security Challenges
254(22)
Ghossoon M. Waleed Al-Saadoon
Ebrahim Al Naemi
Chapter 15 The Impact of Big Data on Security
276(23)
Mohammad Alaa Hussain Al-Hamami
Chapter 16 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback
299(15)
S. Karthik
A. Rajiv Kannan
Chapter 17 A New Approach in Cloud Computing User Authentication
314(16)
Alaa Hussein Al-Hamami
Rafal A. Al-Khashab
Chapter 18 Trust Determination in Wireless Ad Hoc Networks
330(19)
Hussein Al-Bahadili
Chapter 19 Security in Mobile Computing
349(15)
Venus W. Samawi
Chapter 20 The Security Impacts on Social Media Platforms
364(17)
Mohammad Alaa Hussain Al-Hamami
Chapter 21 Security in Digital Images: From Information Hiding Perspective
381(14)
Mohammed A. Otair
Compilation of References 395(22)
About the Contributors 417(7)
Index 424
Alaa Hussein Al-Hamami Amman Arab University, Jordan.

Ghossoon M. Waleed al-Saadoon Applied Sciences University, Kingdom of Bahrain.