• Medientyp: E-Book
  • Titel: Information security in diverse computing environments
  • Beteiligte: Kayem, Anne [HerausgeberIn]; Meinel, Christoph [HerausgeberIn]
  • Körperschaft: IGI Global
  • Erschienen: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA): IGI Global, 2014
  • Umfang: Online-Ressource(PDFs (354 pages).)
  • Sprache: Englisch
  • DOI: 10.4018/978-1-4666-6158-5
  • ISBN: 1466661585; 9781466661615; 9781466661592; 9781466661585
  • Identifikator:
  • Schlagwörter: Information technology Security measures ; Data protection ; Computer security ; Access control ; Anonymization and authentication ; Cloud security ; Formal methods of verification ; Information security ; Mobile viruses and worms ; Network security ; Secure mobile platforms ; Unconventional security solutions
  • Reproduktionsnotiz: Also available in print
  • Entstehung:
  • Anmerkungen: Includes bibliographical references
    Restricted to subscribers or individual electronic text purchasers
    Mode of access: World Wide Web
  • Beschreibung: "This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by discussing challenges faced by researchers as well as unconventional solutions to these problems"--Provided by publisher.

    Diversity in security environments: the why and the wherefore / Anne V. D. M. Kayem, Richard Ssembatya, Mark-John Burke -- Foreground trust as a security paradigm: turning users into strong links / Stephen Marsh, Natasha Dwyer, Anirban Basu, Tim Storer, Karen Renaud, Khalil El-Khatib, Babak Esfandiari, Sylvie Noe͏̈l, Mehmet Vefa Bicakci -- A state-of-the-art review of data stream anonymization schemes / Aderonke B. Sakpere, Anne V. D. M. Kayem -- Is it privacy or is it access control? / Sylvia L. Osborn -- Design of an IPTV conditional access system supporting multiple-services / Gregory L. Harding, Anne V. D. M. Kayem -- Standing your ground: current and future challenges in cyber defense / Barry V. W. Irwin -- Necessary standard for providing privacy and security in IPv6 networks / Hosnieh Rafiee, Christoph Meinel -- A security analysis of MPLS service degradation attacks based on restricted adversary models / Abdulrahman Al-Mutairi, Stephen D. Wolthusen -- The future of national and international security on the internet / Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette -- Similarity measure for obfuscated malware analysis / P. Vinod, P. R. Rakesh, G. Alphy -- Mobile worms and viruses / Nidhi Goel, Balasubramanian Raman, Indra Gupta -- On complex crimes and digital forensics / Martin S. Olivier -- Transform domain techniques for image steganography / Siddharth Singh, Tanveer J. Siddiqui -- Experiences with threat modeling on a prototype social network / Anne V. D. M. Kayem, Rotondwa Ratshidaho, Molulaqhooa L. Maoyi, Sanele Macanda -- Solving security and availability challenges in public clouds / Maxim Schnjakin, Christoph Meinel -- Information security innovation: personalisation of security services in a mobile cloud infrastructure / Jan H. P. Eloff, Mariki M. Eloff, Madeleine A. Bihina Bella, Donovan Isherwood, Moses T. Dlamini, Ernest Ketcha Ngassam
  • Zugangsstatus: Eingeschränkter Zugang | Informationen zu lizenzierten elektronischen Ressourcen der SLUB