Information Technology Security (Record no. 87793)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03612nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-97-0407-1 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730171741.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240401s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819704071 |
-- | 978-981-97-0407-1 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Information Technology Security |
Sub Title | Modern Trends and Challenges / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XI, 233 p. 63 illus., 49 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Springer Tracts in Electrical and Electronics Engineering, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Zero Trust Security Architecture for Digital Privacy in Healthcare -- Security issues and challenges in deploying a CPS using WSN -- Firewall: A Vital Constituent of Network Security -- Exploring the Landscape of Password Managers for Individual Users through Innovative Solution -- Review on Wi-Fi attacks and Detection methods -- Privacy Preserving Spatio-Temporal Attribute Based Access Control for Collaborative E-Healthcare -- Advances in Differential Privacy and Differentially Private Machine Learning -- Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks -- MRMM based keystream generators for information security. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security. |
700 1# - AUTHOR 2 | |
Author 2 | Gountia, Debasis. |
700 1# - AUTHOR 2 | |
Author 2 | Dalei, Dilip Kumar. |
700 1# - AUTHOR 2 | |
Author 2 | Mishra, Subhankar. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-97-0407-1 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Application software. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cooperating objects (Computer systems). |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer and Information Systems Applications. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Cyber-Physical Systems. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 2731-4219 |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
No items available.