Title | Handbook of research on threat detection and countermeasures in network security / Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors [electronic resource] |
LC Call # | TK5105.59 .A393 2015 |
Dewey Call # | 005.8 |
Added Author | Al-Hamami, Alaa Hussein, 1948-, editor |
| Al-Saadoo, Ghossoon M. Waleed, 1969-, editor |
| Gale Group |
Content | Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon |
| Enhance network intrusion detection system by exploiting BR algorithm as an optimal feature selection / Soukaena Hassan Hashem |
| Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon |
| Real time internal intrusion detection : a case study of embedded sensors and detectors in E-government websites / Zuhoor Al-Khanjari, Asaad Abdulrahman |
| Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani -- chapter 6. Cryptographic has function : a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad |
| Crime profiling system / Hussein Zedan, Meshrif Alruily |
| Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami |
| Cyber crimes : types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy |
| Cyber space security assessment case study / Hanaa M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem |
| Biometric security / Muzhir Shaban Al-Ani |
| Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi |
| Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa |
| Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi |
| The impact of big data on security / Mohammed Alaa Hussain Al-Hamami |
| 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan |
| A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A. Al-Khashab |
| Trust determination in wireless ad hoc networks / Hussein Al-Bahadili |
| Security in mobile computing / Venus W. Samawi |
| The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami |
| Security in digital images : from information hiding perspective / Mohammed A. Otair |
Subject | Computer networks--Security measures |
ISBN | 9781466665842(electronic book) |
| 9781466665835(hardcover) |
| 9781466665866(print & perpetual access) |
Links | Available via Gale Virtual Reference Library. Click here to access |