feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    Online Resource
    Online Resource
    Boca Raton, FL :Auerbach Publishers,
    UID:
    almahu_9948426202002882
    Format: 1 online resource (436 p.)
    ISBN: 1-000-21893-7 , 0-429-11934-8 , 1-281-12778-7 , 9786611127787 , 0-8493-7925-3
    Content: Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
    Note: Description based upon print version of record. , Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks , Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment , Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover , English
    Additional Edition: ISBN 0-8493-7921-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer,
    UID:
    edoccha_BV043933795
    Format: 1 Online Ressource (XIII, 189 p. 27 illus).
    ISBN: 978-981-10-2762-8
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-981-10-2761-1
    Language: English
    Subjects: Economics , Geography
    RVK:
    RVK:
    Keywords: Stadtökonomie ; Stadtplanung ; Wohnungsmarkt ; Wirtschaftsgeografie
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    b3kat_BV049442004
    Format: 1 Online-Ressource (VII, 354 p. 164 illus., 108 illus. in color)
    Edition: 1st ed. 2024
    ISBN: 9789819971619
    Series Statement: Smart Innovation, Systems and Technologies 350
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-9971-60-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-9971-62-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-9971-63-3
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer,
    UID:
    edoccha_BV048918568
    Format: 1 Online-Ressource (ix, 715 Seiten).
    ISBN: 978-3-031-27620-0
    Series Statement: Dao Companions to Chinese Philosophy Volume 18
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27618-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27619-4
    Language: English
    Subjects: Philosophy
    RVK:
    Keywords: v372-v289 Mengzi ; Philosophie
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Boca Raton, FL :Auerbach Publishers,
    UID:
    almafu_9959441230002883
    Format: 1 online resource (436 p.)
    ISBN: 1-000-21893-7 , 0-429-11934-8 , 1-281-12778-7 , 9786611127787 , 0-8493-7925-3
    Content: Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, "Security in Distributed, Grid, Mobile, and Pervasive Computing" focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems.; The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.; After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
    Note: Description based upon print version of record. , Front cover; Contents; Preface; About the Editor; Contributors; Part I: Security in Distributed Computing; Chapter 1. Security for Content Distribution Networks - Concepts, Systems and Research Issues; Chapter 2. Key Management and Agreement in Distributed Systems; Chapter 3. Securing Design Patterns for Distributed Systems; Part II: Security in Mobile Computing; Chapter 4. Pragmatic Security for Constrained Wireless Networks; Chapter 5. Authentication in Wireless Networks; Chapter 6. Intrusion Detection in Wireless Sensor Networks , Chapter 7. False Data Detection and Secure Data Aggregation in Wireless Sensor NetworksChapter 8. Privacy and Anonymity in Mobile Ad Hoc Networks; Chapter 9. Security Issues in the IEEE 802.15.1 Bluetooth Wireless Personal Area Networks; Part III: Security in Grid Computing; Chapter 10. State-of-the-Art Security in Grid Computing; Chapter 11. Unifying Grid and Organizational Security Mechanisms; Chapter 12. Grid Security Architecture: Requirements, Fundamentals, Standards and Models; Chapter 13. A Trust-Based Access Control Management Framework for a Secure Grid Environment , Chapter 14. Distributed Computing Grids-Safety and SecurityPart IV: Security in Pervasive Computing; Chapter 15. Security Solutions for Pervasive Healthcare; Chapter 16. Wireless Sensor Network Security: A Survey; Index; Back cover , English
    Additional Edition: ISBN 0-8493-7921-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham :Springer,
    UID:
    almafu_BV048918568
    Format: 1 Online-Ressource (ix, 715 Seiten).
    ISBN: 978-3-031-27620-0
    Series Statement: Dao Companions to Chinese Philosophy Volume 18
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27618-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-27619-4
    Language: English
    Subjects: Philosophy
    RVK:
    Keywords: v372-v289 Mengzi ; Philosophie
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Albany :State University of New York Press,
    UID:
    almahu_BV043978463
    Format: x, 283 Seiten ; , 24 cm.
    ISBN: 978-1-4384-5095-7
    Series Statement: Suny series in Chinese philosophy and culture
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Philosophy
    RVK:
    RVK:
    Keywords: 1949- Wong, David B. ; Philosophie ; Relativismus ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore : Springer Singapore | Singapore : Springer
    UID:
    b3kat_BV047887562
    Format: 1 Online-Ressource (XIX, 1216 p. 535 illus., 444 illus. in color)
    Edition: 1st ed. 2022
    ISBN: 9789811669637
    Series Statement: Lecture Notes in Electrical Engineering 813
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1669-62-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1669-64-4
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-1669-97-2
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    New York : Springer
    UID:
    b3kat_BV023109411
    Format: 1 Online-Ressource (viii, 422 p.) , ill.
    ISBN: 0387280405 , 9780387280400 , 9780387331126
    Series Statement: Signals and communication technology
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Drahtloses lokales Netz ; Computersicherheit ; Rechnernetz ; Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Taylor & Francis
    UID:
    gbv_1794600507
    Format: 1 Online-Ressource (437 p.)
    ISBN: 9780849379253
    Content: Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field
    Note: English
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages