Computer and Network Security / / edited by Jaydip Sen, Sidra Mehtab.

In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:London : : IntechOpen,, 2020.
©2020
Year of Publication:2020
Language:English
Physical Description:1 online resource (178 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603229304498
ctrlnum (CKB)5400000000042589
(NjHacI)995400000000042589
(EXLCZ)995400000000042589
collection bib_alma
record_format marc
spelling Computer and Network Security / edited by Jaydip Sen, Sidra Mehtab.
London : IntechOpen, 2020.
©2020
1 online resource (178 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF title page (IntechOpen, viewed June 28, 2023).
In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.
Includes bibliographical references and index.
Computer security.
1-83880-856-6
Mehtab, Sidra, editor.
Sen, Jaydip, editor.
language English
format eBook
author2 Mehtab, Sidra,
Sen, Jaydip,
author_facet Mehtab, Sidra,
Sen, Jaydip,
author2_variant s m sm
j s js
author2_role TeilnehmendeR
TeilnehmendeR
title Computer and Network Security /
spellingShingle Computer and Network Security /
title_full Computer and Network Security / edited by Jaydip Sen, Sidra Mehtab.
title_fullStr Computer and Network Security / edited by Jaydip Sen, Sidra Mehtab.
title_full_unstemmed Computer and Network Security / edited by Jaydip Sen, Sidra Mehtab.
title_auth Computer and Network Security /
title_new Computer and Network Security /
title_sort computer and network security /
publisher IntechOpen,
publishDate 2020
physical 1 online resource (178 pages)
isbn 1-83880-856-6
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 C667 42020
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT mehtabsidra computerandnetworksecurity
AT senjaydip computerandnetworksecurity
status_str n
ids_txt_mv (CKB)5400000000042589
(NjHacI)995400000000042589
(EXLCZ)995400000000042589
carrierType_str_mv cr
is_hierarchy_title Computer and Network Security /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1796653209194856448
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02092nam a2200349 i 4500</leader><controlfield tag="001">993603229304498</controlfield><controlfield tag="005">20230629085356.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230629s2020 enk ob 001 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995400000000042589</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042589</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.C667 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Computer and Network Security /</subfield><subfield code="c">edited by Jaydip Sen, Sidra Mehtab.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (178 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF title page (IntechOpen, viewed June 28, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In the era of Internet of Things (IoT), and with the explosive worldwide growth of electronic data volume and the associated needs of processing, analyzing, and storing this data, several new challenges have emerged. Particularly, there is a need for novel schemes of secure authentication, integrity protection, encryption, and non-repudiation to protect the privacy of sensitive data and to secure systems. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents state-of-the-art research in the fields of cryptography and security in computing and communications. It covers a wide range of topics such as machine learning, intrusion detection, steganography, multi-factor authentication, and more. It is a valuable reference for researchers, engineers, practitioners, and graduate and doctoral students working in the fields of cryptography, network security, IoT, and machine learning.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-83880-856-6</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mehtab, Sidra,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-07-08 12:09:20 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5345717200004498&amp;Force_direct=true</subfield><subfield code="Z">5345717200004498</subfield><subfield code="b">Available</subfield><subfield code="8">5345717200004498</subfield></datafield></record></collection>