Handbook of Research on Threat Detection and Countermeasures in Network Security
Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures...
Saved in:
| Main Authors | , |
|---|---|
| Format | eBook Publication |
| Language | English |
| Published |
Hershey
IGI Global Scientific Publishing
2014
IGI Global |
| Edition | 1 |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781466665835 1466665831 9781466665866 1466665866 9781466665842 146666584X |
| DOI | 10.4018/978-1-4666-6583-5 |
Cover
Table of Contents:
- Title Page -- Copyright Page -- Book Series -- Dedication -- Editorial Advisory Board and List of Reviewers -- List of Contributors -- Table of Contents -- Detailed Table of Contents -- Preface -- Acknowledgment -- Chapter 1: Security Concepts, Developments, and Future Trends -- Chapter 2: Enhance Network Intrusion Detection System by Exploiting BR Algorithm as an Optimal Feature Selection -- Chapter 3: Automatic Intrusion Detection and Secret Multi Agent Preservation Using Authentication Measurement Network Threat -- Chapter 4: Real Time Internal Intrusion Detection -- Chapter 5: Authentication Model for Enterprise Resource Planning Network -- Chapter 6: Cryptographic Hash Function -- Chapter 7: Crime Profiling System -- Chapter 8: Proposals to Win the Battle Against Cyber Crime -- Chapter 9: Cyber Crimes -- Chapter 10: Cyber Space Security Assessment Case Study -- Chapter 11: Biometric Security -- Chapter 12: Data Hiding Schemes Based on Singular Value Decomposition -- Chapter 13: Malay Language Text-Based Anti-Spam System Using Neural Network -- Chapter 14: Virtualization Technology and Security Challenges -- Chapter 15: The Impact of Big Data on Security -- Chapter 16: 16-Directional Geographical Traceback with Generalization to Three Dimensional Multidirectional Geographical IP Traceback -- Chapter 17: A New Approach in Cloud Computing User Authentication -- Chapter 18: Trust Determination in Wireless Ad Hoc Networks -- Chapter 19: Security in Mobile Computing -- Chapter 20: The Security Impacts on Social Media Platforms -- Chapter 21: Security in Digital Images -- Compilation of References -- About the Contributors -- Index