Information Technology Security (Record no. 87793)

000 -LEADER
fixed length control field 03612nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-981-97-0407-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730171741.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240401s2024 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789819704071
-- 978-981-97-0407-1
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Information Technology Security
Sub Title Modern Trends and Challenges /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XI, 233 p. 63 illus., 49 illus. in color.
490 1# - SERIES STATEMENT
Series statement Springer Tracts in Electrical and Electronics Engineering,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Zero Trust Security Architecture for Digital Privacy in Healthcare -- Security issues and challenges in deploying a CPS using WSN -- Firewall: A Vital Constituent of Network Security -- Exploring the Landscape of Password Managers for Individual Users through Innovative Solution -- Review on Wi-Fi attacks and Detection methods -- Privacy Preserving Spatio-Temporal Attribute Based Access Control for Collaborative E-Healthcare -- Advances in Differential Privacy and Differentially Private Machine Learning -- Secure Certificateless Maximum Achievable Throughput in Successive IoT Relay Networks -- MRMM based keystream generators for information security.
520 ## - SUMMARY, ETC.
Summary, etc This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical. Some of the themes covered include network security, firewall security, automation in forensic science and criminal investigation, Medical of Things (MOT) security, healthcare system security, end-point security, smart energy systems, smart infrastructure systems, intrusion detection/prevention, security standards and policies, among others. This book is a useful guide for those in academia and industry working in the broad field of IT security.
700 1# - AUTHOR 2
Author 2 Gountia, Debasis.
700 1# - AUTHOR 2
Author 2 Dalei, Dilip Kumar.
700 1# - AUTHOR 2
Author 2 Mishra, Subhankar.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-97-0407-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cooperating objects (Computer systems).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyber-Physical Systems.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 2731-4219
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS

No items available.