Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Subjects(RVK)
Keywords
Access
  • 1
    UID:
    almahu_9949386603902882
    Format: 1 online resource
    ISBN: 1000285057 , 9781003034049 , 1003034047 , 9781000285079 , 1000285073 , 9781000285062 , 1000285065 , 9781000285055
    Content: A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.
    Note: 1. Access Control Methods in Cloud Enabled the Cloud-Enabled Internet of Things -- 2. An Intelligent Weighted Fuzzy Cluster-Based Secure Routing Algorithm for Mobile Ad-Hoc Networks -- 3. Ensuring Security Through Trust in Mobile Ad-Hoc Networks Using Soft Computing Methods -- 4. Prooof of Virture: Nonce-Free Hash Generation in Blockchain -- 5. Password Authentication Using Keystroke Biometric -- 6. Healthcare Data Analytics over Big Data -- 7. Bluetooth: State of the Art, Taxonomy, and Open Issues for Managing Security Services in Heterogeneous Networks.
    Additional Edition: Print version: ISBN 9780367457341
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1000088065?
Did you mean 1000175065?
Did you mean 1000204065?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages