000 | 03612nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-981-97-0407-1 | ||
003 | DE-He213 | ||
005 | 20240730171741.0 | ||
007 | cr nn 008mamaa | ||
008 | 240401s2024 si | s |||| 0|eng d | ||
020 |
_a9789819704071 _9978-981-97-0407-1 |
||
024 | 7 |
_a10.1007/978-981-97-0407-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Technology Security _h[electronic resource] : _bModern Trends and Challenges / _cedited by Debasis Gountia, Dilip Kumar Dalei, Subhankar Mishra. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXI, 233 p. 63 illus., 49 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSpringer Tracts in Electrical and Electronics Engineering, _x2731-4219 |
|
505 | 0 | _aZero Trust Security Architecture for Digital Privacy in Healthcare -- Security issues and challenges in deploying a CPS using WSN -- Firewall: A Vital Constituent of Network Security -- Exploring the Landscape of Password Managers for Individual Users through Innovative Solution -- Review on Wi-Fi attacks and Detection methods -- Privacy Preserving Spatio-Temporal Attribute Based Access Control for Collaborative E-Healthcare -- Advances in Differential Privacy and Differentially Private Machine Learning -- Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks -- MRMM based keystream generators for information security. | |
520 | _aThis book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aApplication software. _9100239 |
|
650 | 0 |
_aCooperating objects (Computer systems). _96195 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9100241 |
650 | 2 | 4 |
_aCyber-Physical Systems. _932475 |
700 | 1 |
_aGountia, Debasis. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100244 |
|
700 | 1 |
_aDalei, Dilip Kumar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100245 |
|
700 | 1 |
_aMishra, Subhankar. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9100247 |
|
710 | 2 |
_aSpringerLink (Online service) _9100250 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819704064 |
776 | 0 | 8 |
_iPrinted edition: _z9789819704088 |
776 | 0 | 8 |
_iPrinted edition: _z9789819704095 |
830 | 0 |
_aSpringer Tracts in Electrical and Electronics Engineering, _x2731-4219 _9100252 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-97-0407-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cEBK | ||
999 |
_c87793 _d87793 |