Amazon cover image
Image from Amazon.com

Handbook of research on threat detection and countermeasures in network security / Alaa Hussein Al-Hamami and Ghossoon M. Waleed al-Saadoon, editors.

Contributor(s): Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2015]Description: PDFs (426 pages) : illustrationsContent type:
  • text
Media type:
  • electronic
Carrier type:
  • online resource
ISBN:
  • 9781466665842
Subject(s): Genre/Form: Additional physical formats: No title; Print version:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • TK5105.59 .A393 2015e
Online resources: Available additional physical forms:
  • Also available in print.
Contents:
Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon -- Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem -- Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon -- Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef -- Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani -- Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad -- Crime profiling system / Hussein Zedan, Meshrif Alruily -- Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami -- Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy -- Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem -- Biometric security / Muzhir Shaban Al-Ani -- Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi -- Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa -- Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi -- The impact of big data on security / Mohammad Alaa Hussain Al-Hamami -- 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan -- A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab -- Trust determination in wireless ad hoc networks / Hussein Al-Bahadili -- Security in mobile computing / Venus W. Samawi -- The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami -- Security in digital images: from information hiding perspective / Mohammed A. Otair.
Abstract: "This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.
Item type: eBooks
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Security concepts, developments, and future trends / Alaa Hussein Al-Hamami, Ghossoon M. Waleed Al-Saadoon -- Enhance network intrusion detection system by exploiting BR Algorithm as an optimal feature selection / Soukaena Hassan Hashem -- Automatic intrusion detection and secret multi agent preservation using authentication measurement network threat / Ghossoon M. Waleed Al-Saadoon -- Real time internal intrusion detection: a case study of embedded sensors and detectors in e-government websites / Zuhoor Abdullah Salim Al-Khanjari, Asaad Abdulrahman Nayyef -- Authentication model for enterprise resource planning network / Wasim A. Al-Hamdani -- Cryptographic hash function: a high level view / Imad Fakhri Alshaikhli, Mohammad Abdulateef AlAhmad -- Crime profiling system / Hussein Zedan, Meshrif Alruily -- Proposals to win the battle against cyber crime / Alaa Hussein Al-Hamami -- Cyber crimes: types, sizes, defence mechanism, and risk mitigation / Hasan L. Al-Saedy -- Cyber space security assessment case study / Hanaa. M. Said, Rania El Gohary, Mohamed Hamdy, Abdelbadeeh M. Salem -- Biometric security / Muzhir Shaban Al-Ani -- Data hiding schemes based on singular value decomposition / Nidhal Khdhair El Abbadi -- Malay language text-based anti-spam system using neural network / Hamid A. Jalab, Thamarai Subramaniam, Alaa Y. Taqa -- Virtualization technology and security challenges / Ghossoon M. Waleed Al-Saadoon, Ebrahim Al Naemi -- The impact of big data on security / Mohammad Alaa Hussain Al-Hamami -- 16-directional geographical traceback with generalization to three dimensional multidirectional geographical IP traceback / S. Karthik, A. Rajiv Kannan -- A new approach in cloud computing user authentication / Alaa Hussein Al-Hamami, Rafal A Al-Khashab -- Trust determination in wireless ad hoc networks / Hussein Al-Bahadili -- Security in mobile computing / Venus W. Samawi -- The security impacts on social media platforms / Mohammad Alaa Hussain Al-Hamami -- Security in digital images: from information hiding perspective / Mohammed A. Otair.

Restricted to subscribers or individual electronic text purchasers.

"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--Provided by publisher.

Also available in print.

Mode of access: World Wide Web.

Description based on title screen (IGI Global, viewed 05/16/2015).

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu