Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/829
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bokhari, M. U. ; | en_US |
dc.contributor.author | Agrawal, Namrata. ; | en_US |
dc.contributor.author | Saini, Dharmendra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:30Z | - |
dc.date.available | 2020-05-17T08:22:30Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811085369 ; | en_US |
dc.identifier.isbn | 9789811085352 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/829 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9789811085352. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike. ; | en_US |
dc.description.statementofresponsibility | edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini. | en_US |
dc.format.extent | XXIII, 505 p. 191 illus., 117 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.haspart | 9789811085352.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Cyber Security | en_US |
dc.title.alternative | Proceedings of CSI 2015 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811085352.pdf | 14.77 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bokhari, M. U. ; | en_US |
dc.contributor.author | Agrawal, Namrata. ; | en_US |
dc.contributor.author | Saini, Dharmendra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:30Z | - |
dc.date.available | 2020-05-17T08:22:30Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811085369 ; | en_US |
dc.identifier.isbn | 9789811085352 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/829 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9789811085352. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike. ; | en_US |
dc.description.statementofresponsibility | edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini. | en_US |
dc.format.extent | XXIII, 505 p. 191 illus., 117 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.haspart | 9789811085352.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Cyber Security | en_US |
dc.title.alternative | Proceedings of CSI 2015 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811085352.pdf | 14.77 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bokhari, M. U. ; | en_US |
dc.contributor.author | Agrawal, Namrata. ; | en_US |
dc.contributor.author | Saini, Dharmendra. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:22:30Z | - |
dc.date.available | 2020-05-17T08:22:30Z | - |
dc.date.issued | 2018 | en_US |
dc.identifier.isbn | 9789811085369 ; | en_US |
dc.identifier.isbn | 9789811085352 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/829 | - |
dc.description | en_US | |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9789811085352. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike. ; | en_US |
dc.description.statementofresponsibility | edited by M. U. Bokhari, Namrata Agrawal, Dharmendra Saini. | en_US |
dc.format.extent | XXIII, 505 p. 191 illus., 117 illus. in color. ; online resource. ; | en_US |
dc.publisher | Springer Singapore : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.ispartofseries | Advances in Intelligent Systems and Computing, ; 2194-5357 ; ; 729. ; | en_US |
dc.relation.haspart | 9789811085352.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Coding theory. ; | en_US |
dc.subject | Computer crimes. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Cybercrime. ; | en_US |
dc.subject | Coding and Information Theory. ; | en_US |
dc.title | Cyber Security | en_US |
dc.title.alternative | Proceedings of CSI 2015 / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Singapore : | en_US |
Appears in Collections: | مدیریت فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9789811085352.pdf | 14.77 MB | Adobe PDF | Preview File |