Improving information security practices through computational intelligence:
"This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--Prov...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :
IGI Global,
[2016]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--Provided by publisher. |
Beschreibung: | PDFs (327 pages) : illustrations. Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781466694279 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00132453 | ||
003 | IGIG | ||
005 | 20150916125152.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 150912s2016 paua fob 001 0 eng d | ||
010 | |z 2015028208 | ||
020 | |a 9781466694279 |q electronic | ||
020 | |z 9781466694262 |q print | ||
024 | 7 | |a 10.4018/978-1-4666-9426-2 |2 doi | |
035 | |a (CaBNVSL)gtp00563876 | ||
035 | |a (OCoLC)921283964 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a Q342 |b .I46 2016e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Improving information security practices through computational intelligence |c Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : |b IGI Global, |c [2016] | |
300 | |a PDFs (327 pages) : |b illustrations. | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Computational intelligence paradigms: an overview / El-Sayed M. El-Alfy, Wasan Shaker Awad -- Computational intelligence in cryptology / Wasan Shaker Awad, El-Sayed M. El-Alfy -- Automated design of stream ciphers using GADS / Wasan Shaker Awad, Amal M. Al Hiddi -- Chaotic-based and biologically inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, Akhilesh Tiwari -- Agents for intrusion detection in MANET: a survey and analysis / Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday -- Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks / Martin Drahansky [and 6 others] -- Improving the security of digital images in Hadamard transform domain using digital watermarking / V. Santhi, D. P. Acharjya -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Zaliha Yuce Tok. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 09/12/2015). | ||
650 | 0 | |a Computational intelligence. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
653 | |a Biologically-based cryptosystems | ||
653 | |a Biometric authentication | ||
653 | |a Chaos-based cryptosystems | ||
653 | |a Cryptography | ||
653 | |a Digital signatures | ||
653 | |a Digital watermarking | ||
653 | |a Image communication and storage | ||
700 | 1 | |a Al-Bastaki, Yousif A. Latif, |e editor. | |
700 | 1 | |a Awad, Wasan Shaker |d 1969- |e editor. | |
700 | 1 | |a El-Alfy, El Sayed M. |d 1968- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2015028208 | |
776 | 0 | 8 | |i Print version: |z 1466694262 |z 9781466694262 |w (DLC) 2015028208 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9426-2 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00132453 |
---|---|
_version_ | 1804751452147548160 |
adam_text | |
any_adam_object | |
author2 | Al-Bastaki, Yousif A. Latif Awad, Wasan Shaker 1969- El-Alfy, El Sayed M. 1968- |
author2_role | edt edt edt |
author2_variant | y a l a b yala yalab w s a ws wsa e s m e a esme esmea |
author_facet | Al-Bastaki, Yousif A. Latif Awad, Wasan Shaker 1969- El-Alfy, El Sayed M. 1968- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | Q342 |
callnumber-raw | Q342 .I46 2016e |
callnumber-search | Q342 .I46 2016e |
callnumber-sort | Q 3342 I46 42016E |
callnumber-subject | Q - General Science |
collection | ZDB-98-IGB |
contents | Computational intelligence paradigms: an overview / El-Sayed M. El-Alfy, Wasan Shaker Awad -- Computational intelligence in cryptology / Wasan Shaker Awad, El-Sayed M. El-Alfy -- Automated design of stream ciphers using GADS / Wasan Shaker Awad, Amal M. Al Hiddi -- Chaotic-based and biologically inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, Akhilesh Tiwari -- Agents for intrusion detection in MANET: a survey and analysis / Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday -- Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks / Martin Drahansky [and 6 others] -- Improving the security of digital images in Hadamard transform domain using digital watermarking / V. Santhi, D. P. Acharjya -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Zaliha Yuce Tok. |
ctrlnum | (CaBNVSL)gtp00563876 (OCoLC)921283964 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03576nam a2200565 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00132453</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20150916125152.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">150912s2016 paua fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2015028208</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466694279</subfield><subfield code="q">electronic</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781466694262</subfield><subfield code="q">print</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-4666-9426-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)gtp00563876</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)921283964</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">Q342</subfield><subfield code="b">.I46 2016e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Improving information security practices through computational intelligence </subfield><subfield code="c">Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">PDFs (327 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Computational intelligence paradigms: an overview / El-Sayed M. El-Alfy, Wasan Shaker Awad -- Computational intelligence in cryptology / Wasan Shaker Awad, El-Sayed M. El-Alfy -- Automated design of stream ciphers using GADS / Wasan Shaker Awad, Amal M. Al Hiddi -- Chaotic-based and biologically inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, Akhilesh Tiwari -- Agents for intrusion detection in MANET: a survey and analysis / Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday -- Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks / Martin Drahansky [and 6 others] -- Improving the security of digital images in Hadamard transform domain using digital watermarking / V. Santhi, D. P. Acharjya -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Zaliha Yuce Tok.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 09/12/2015).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computational intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Biologically-based cryptosystems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Biometric authentication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Chaos-based cryptosystems</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital signatures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Image communication and storage</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Bastaki, Yousif A. Latif,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Awad, Wasan Shaker</subfield><subfield code="d">1969-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">El-Alfy, El Sayed M.</subfield><subfield code="d">1968-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2015028208</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1466694262</subfield><subfield code="z">9781466694262</subfield><subfield code="w">(DLC) 2015028208</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9426-2</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00132453 |
illustrated | Illustrated |
indexdate | 2024-07-16T15:51:47Z |
institution | BVB |
isbn | 9781466694279 |
language | English |
oclc_num | 921283964 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | PDFs (327 pages) : illustrations. Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IGI Global, |
record_format | marc |
spelling | Improving information security practices through computational intelligence Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA) : IGI Global, [2016] PDFs (327 pages) : illustrations. text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Computational intelligence paradigms: an overview / El-Sayed M. El-Alfy, Wasan Shaker Awad -- Computational intelligence in cryptology / Wasan Shaker Awad, El-Sayed M. El-Alfy -- Automated design of stream ciphers using GADS / Wasan Shaker Awad, Amal M. Al Hiddi -- Chaotic-based and biologically inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, Akhilesh Tiwari -- Agents for intrusion detection in MANET: a survey and analysis / Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday -- Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks / Martin Drahansky [and 6 others] -- Improving the security of digital images in Hadamard transform domain using digital watermarking / V. Santhi, D. P. Acharjya -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Zaliha Yuce Tok. Restricted to subscribers or individual electronic text purchasers. "This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering"--Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 09/12/2015). Computational intelligence. Computer security. Data protection. Biologically-based cryptosystems Biometric authentication Chaos-based cryptosystems Cryptography Digital signatures Digital watermarking Image communication and storage Al-Bastaki, Yousif A. Latif, editor. Awad, Wasan Shaker 1969- editor. El-Alfy, El Sayed M. 1968- editor. IGI Global, publisher. (Original) (DLC)2015028208 Print version: 1466694262 9781466694262 (DLC) 2015028208 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9426-2 Volltext |
spellingShingle | Improving information security practices through computational intelligence Computational intelligence paradigms: an overview / El-Sayed M. El-Alfy, Wasan Shaker Awad -- Computational intelligence in cryptology / Wasan Shaker Awad, El-Sayed M. El-Alfy -- Automated design of stream ciphers using GADS / Wasan Shaker Awad, Amal M. Al Hiddi -- Chaotic-based and biologically inspired cryptosystems for secure image communication and storage / El-Sayed M. El-Alfy -- The conceptual and architectural design of an intelligent intrusion detection system / Mradul Dhakar, Akhilesh Tiwari -- Agents for intrusion detection in MANET: a survey and analysis / Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi -- Applications of digital signature certificates for online information security / Mohammad Tariq Banday -- Cryptomodules in wireless networks using biometric authentication: securing nodes in wireless networks / Martin Drahansky [and 6 others] -- Improving the security of digital images in Hadamard transform domain using digital watermarking / V. Santhi, D. P. Acharjya -- Computational aspects of lattice-based cryptography on graphical processing unit / Sedat Akleylek, Zaliha Yuce Tok. Computational intelligence. Computer security. Data protection. |
title | Improving information security practices through computational intelligence |
title_auth | Improving information security practices through computational intelligence |
title_exact_search | Improving information security practices through computational intelligence |
title_full | Improving information security practices through computational intelligence Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors. |
title_fullStr | Improving information security practices through computational intelligence Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors. |
title_full_unstemmed | Improving information security practices through computational intelligence Wasan Shaker Awad, El Sayed M. El-Alfy, and Yousif Al-Bastaki, editors. |
title_short | Improving information security practices through computational intelligence |
title_sort | improving information security practices through computational intelligence |
topic | Computational intelligence. Computer security. Data protection. |
topic_facet | Computational intelligence. Computer security. Data protection. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-9426-2 |
work_keys_str_mv | AT albastakiyousifalatif improvinginformationsecuritypracticesthroughcomputationalintelligence AT awadwasanshaker improvinginformationsecuritypracticesthroughcomputationalintelligence AT elalfyelsayedm improvinginformationsecuritypracticesthroughcomputationalintelligence AT igiglobal improvinginformationsecuritypracticesthroughcomputationalintelligence |