Bibliographic Detail  #63333    

Material Type Electronic Resource
TitleHandbook of research on threat detection and countermeasures in network security / Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors [electronic resource]
LC Call # TK5105.59 .A393 2015
Dewey Call #005.8
Added AuthorAl-Hamami, Alaa Hussein, 1948-, editor
 Al-Saadoo, Ghossoon M. Waleed, 1969-, editor
 Gale Group
ContentSecurity concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon
 Enhance network intrusion detection system by exploiting BR algorithm as an optimal feature selection / Soukaena Hassan Hashem
 Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon
 Real time internal intrusion detection : a case study of embedded sensors and detectors in E-government websites / Zuhoor Al-Khanjari, Asaad Abdulrahman
 Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani -- chapter 6. Cryptographic has function : a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad
 Crime profiling system / Hussein Zedan, Meshrif Alruily
 Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami
 Cyber crimes : types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy
 Cyber space security assessment case study / Hanaa M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem
 Biometric security / Muzhir Shaban Al-Ani
 Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi
 Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa
 Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi
 The impact of big data on security / Mohammed Alaa Hussain Al-Hamami
 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan
 A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A. Al-Khashab
 Trust determination in wireless ad hoc networks / Hussein Al-Bahadili
 Security in mobile computing / Venus W. Samawi
 The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami
 Security in digital images : from information hiding perspective / Mohammed A. Otair
SubjectComputer networks--Security measures
ISBN9781466665842(electronic book)
 9781466665835(hardcover)
 9781466665866(print & perpetual access)
LinksAvailable via Gale Virtual Reference Library. Click here to access
| Order
LibraryOrdered DateCopiesStatus
PSU Phuket Campus Library09 Jul 20191Completely Received
Add Comment Dialog
Your Name
Comment

Add Review Dialog
Your Name
Content
Add to list
Title
Create in
Use same folder
Create a Folder
Folder Name
Add to list result
Hold Dialog
Branch Receive
Expected Date Received
 
Request Inprocess Items
เงื่อนไข
  • 1. ส่งคำขอเวลา 8.30-11.00น รับหนังสือเวลา 16.00น.
  • 2. ส่งคำขอหลังเวลา 11.00น. รับหนังสือในวันทำการถัดไป
  • 3. ส่งคำขอ วันศุกร์ช่วงบ่าย หรือ วันเสาร์-อาทิตย์ รับหนังสือวันจันทร์ 16.00น.
  • 4. ติดต่อรับหนังสือด่วนได้ที่ เคาน์เตอร์บริการยืม-คืน ชั้น 3 *ภายใน 3 วัน*
ติดต่อสอบถามข้อมูลเพิ่มเติม โทร. 2352
Items Location Map
Result Dialog
Undefined result.
Login Dialog
Username:
Password:
Forgot your password ?