skip to content
Emerging trends in ICT security Preview this item
ClosePreview this item
Checking...

Emerging trends in ICT security

Author: Babak Akhgar; Hamid Arabnia
Publisher: Amsterdam ; Boston : Morgan Kaufmann/Elsevier, [2014] ©2014
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation. It gives you the knowledge needed for successful deployment of security solutions in many environments.
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Babak Akhgar; Hamid Arabnia
ISBN: 9780124114746 0124114741
OCLC Number: 856647734
Description: xxix, 631 pages : illustrations ; 25 cm
Contents: System security engineering for information systems --
Metrics and indicators as key organizational assets for ICT security assessment --
A fresh look at semantic natural language information assurance and security: NL IAS from watermarking and downgrading to discovering unintended inferences and situational conceptual defaults --
An approach to facilitate security assurance for information sharing and exchange in big-data applications --
Gamification of information security awareness training --
A conceptual framework for information security awareness, assessment, and training --
Security projects for systems and networking professionals --
Assessing the role of governments in securing e-business: the case of Jordan --
A survey of Quantum Key Distribution (QKD) technologies --
Advances in self-security of agent-based intrusion detection systems --
Secure communication in fiber-optic networks --
Advanced security network metrics --
Designing trustworthy software systems using the NFR approach --
Analyzing the ergodic secrecy rates of cooperative amplify-and-forward relay networks over generalized fading channels --
Algebraic approaches to a network-type private information retrieval --
Using event reasoning for trajectory tracking --
Resource-efficient multi-source authentication utilizing split-join one-way key chain --
Real-time network intrusion detection using Hadoop-based Bayesian classifier --
Optimum countermeasure portfolio selection: a knapsack approach --
CSRF and big data: rethinking cross-site request forgery in light of big data --
Security through emulation-based processor diversification --
On the use of unsupervised techniques for fraud detection in VoIP networks --
Emerging security challenges in cloud computing, from infrastructure-based security to proposed provisioned cloud infrastructure --
Detection of intent-based vulnerabilities in android applications --
A quick perspective on the current state in cybersecurity --
A paradigm shift in cyberspace security --
Counter cyber attacks by semantic networks --
Man-in-the-browser attacks in modern web browsers --
Improving security in web sessions: special management of cookies --
Leveraging semantic web technologies for access control --
Cyber security education: the merits of firewall exercises --
Surveillance without borders: the case of Karen refugees in Sheffield --
A framework for the investigation and modeling of online radicalization and the identification of radicalized individuals --
Preventing terrorism together: a framework to provide social media anti-radicalization training for credible community voices --
Investigating radicalized individual profiles through fuzzy cognitive maps --
Financial security against money laundering: a survey --
Intelligent banking XML encryption using effective fuzzy logic.
Responsibility: edited by Babak Akhgar, Hamid R. Arabnia.

Abstract:

Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation. It gives you the  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"Contemporary threats to national security and neighborhood safety are increasingly non-physical. Those who seek to destroy citizen freedoms and liberties are harnessing the power of Information Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(4)

User lists with this item (4)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/856647734> # Emerging trends in ICT security
    a schema:Book, schema:CreativeWork ;
   library:oclcnum "856647734" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ne> ;
   schema:about <http://id.loc.gov/authorities/subjects/sh2008117723> ; # Computer crimes--Prevention
   schema:about <http://id.worldcat.org/fast/1905567> ; # Cyberterrorism--Prevention
   schema:about <http://id.worldcat.org/fast/907477> ; # Electronic surveillance
   schema:about <http://experiment.worldcat.org/entity/work/data/1418605981#Topic/cyberterrorism_prevention> ; # Cyberterrorism--Prevention
   schema:about <http://dewey.info/class/005.8/e23/> ;
   schema:about <http://id.worldcat.org/fast/973129> ; # Information technology--Security measures
   schema:about <http://id.loc.gov/authorities/subjects/sh2009127217> ; # Information technology--Security measures
   schema:about <http://id.worldcat.org/fast/872068> ; # Computer crimes--Prevention
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2014" ;
   schema:datePublished "2014" ;
   schema:description "Discusses the foundations and theoretical aspects of ICT security. This title covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation. It gives you the knowledge needed for successful deployment of security solutions in many environments."@en ;
   schema:description "System security engineering for information systems -- Metrics and indicators as key organizational assets for ICT security assessment -- A fresh look at semantic natural language information assurance and security: NL IAS from watermarking and downgrading to discovering unintended inferences and situational conceptual defaults -- An approach to facilitate security assurance for information sharing and exchange in big-data applications -- Gamification of information security awareness training -- A conceptual framework for information security awareness, assessment, and training -- Security projects for systems and networking professionals -- Assessing the role of governments in securing e-business: the case of Jordan -- A survey of Quantum Key Distribution (QKD) technologies -- Advances in self-security of agent-based intrusion detection systems -- Secure communication in fiber-optic networks -- Advanced security network metrics -- Designing trustworthy software systems using the NFR approach -- Analyzing the ergodic secrecy rates of cooperative amplify-and-forward relay networks over generalized fading channels -- Algebraic approaches to a network-type private information retrieval -- Using event reasoning for trajectory tracking -- Resource-efficient multi-source authentication utilizing split-join one-way key chain -- Real-time network intrusion detection using Hadoop-based Bayesian classifier -- Optimum countermeasure portfolio selection: a knapsack approach -- CSRF and big data: rethinking cross-site request forgery in light of big data -- Security through emulation-based processor diversification -- On the use of unsupervised techniques for fraud detection in VoIP networks -- Emerging security challenges in cloud computing, from infrastructure-based security to proposed provisioned cloud infrastructure -- Detection of intent-based vulnerabilities in android applications -- A quick perspective on the current state in cybersecurity -- A paradigm shift in cyberspace security -- Counter cyber attacks by semantic networks -- Man-in-the-browser attacks in modern web browsers -- Improving security in web sessions: special management of cookies -- Leveraging semantic web technologies for access control -- Cyber security education: the merits of firewall exercises -- Surveillance without borders: the case of Karen refugees in Sheffield -- A framework for the investigation and modeling of online radicalization and the identification of radicalized individuals -- Preventing terrorism together: a framework to provide social media anti-radicalization training for credible community voices -- Investigating radicalized individual profiles through fuzzy cognitive maps -- Financial security against money laundering: a survey -- Intelligent banking XML encryption using effective fuzzy logic."@en ;
   schema:editor <http://viaf.org/viaf/103807397> ; # Babak Akhgar
   schema:editor <http://viaf.org/viaf/41210568> ; # Hamid Arabnia
   schema:exampleOfWork <http://worldcat.org/entity/work/id/1418605981> ;
   schema:inLanguage "en" ;
   schema:name "Emerging trends in ICT security"@en ;
   schema:productID "856647734" ;
   schema:workExample <http://worldcat.org/isbn/9780124114746> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/856647734> ;
    .


Related Entities

<http://id.loc.gov/authorities/subjects/sh2008117723> # Computer crimes--Prevention
    a schema:Intangible ;
   schema:name "Computer crimes--Prevention"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009127217> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1905567> # Cyberterrorism--Prevention
    a schema:Intangible ;
   schema:name "Cyberterrorism--Prevention"@en ;
    .

<http://id.worldcat.org/fast/872068> # Computer crimes--Prevention
    a schema:Intangible ;
   schema:name "Computer crimes--Prevention"@en ;
    .

<http://id.worldcat.org/fast/907477> # Electronic surveillance
    a schema:Intangible ;
   schema:name "Electronic surveillance"@en ;
    .

<http://id.worldcat.org/fast/973129> # Information technology--Security measures
    a schema:Intangible ;
   schema:name "Information technology--Security measures"@en ;
    .

<http://viaf.org/viaf/103807397> # Babak Akhgar
    a schema:Person ;
   schema:familyName "Akhgar" ;
   schema:givenName "Babak" ;
   schema:name "Babak Akhgar" ;
    .

<http://viaf.org/viaf/41210568> # Hamid Arabnia
    a schema:Person ;
   schema:familyName "Arabnia" ;
   schema:givenName "Hamid" ;
   schema:name "Hamid Arabnia" ;
    .

<http://worldcat.org/isbn/9780124114746>
    a schema:ProductModel ;
   schema:isbn "0124114741" ;
   schema:isbn "9780124114746" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.