Midlands State University Library
Image from Google Jackets

Emerging trends in ICT security edited Babak Akhgar and Hamid R. Arabnia

Contributor(s): Material type: TextTextPublication details: Amsterdam Boston Heidelberg London New York Oxford Paris San Diego Elsevier 2014Description: xxix, 631 pages ill. 22 cmContent type:
  • txt
Media type:
  • rdamedia
Carrier type:
  • rdacarrier
ISBN:
  • 9780124114746
Subject(s): LOC classification:
  • QA76.9
Summary: Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Core Collection Main Library Core Collection QA76.9 EME (Browse shelf(Opens below)) 148321 Available BK134706

Includes a bibliography and an index

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.
Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures
Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks
Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing

There are no comments on this title.

to post a comment.