Managing security services in heterogenous networks: confidentiality, integrity, availability, authentication, and access control
A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the fou...
Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press
2021
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781000285079/?ar |
Zusammenfassung: | A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace. |
Umfang: | 1 Online-Ressource |
ISBN: | 1000285057 9781003034049 1003034047 9781000285079 1000285073 9781000285062 1000285065 9781000285055 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-102559767 | ||
003 | DE-627-1 | ||
005 | 20240429114540.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240429s2021 xx |||||o 00| ||eng c | ||
020 | |a 1000285057 |9 1-000-28505-7 | ||
020 | |a 9781003034049 |c electronic bk. |9 978-1-003-03404-9 | ||
020 | |a 1003034047 |c electronic bk. |9 1-003-03404-7 | ||
020 | |a 9781000285079 |c electronic bk. : EPUB |9 978-1-000-28507-9 | ||
020 | |a 1000285073 |c electronic bk. : EPUB |9 1-000-28507-3 | ||
020 | |a 9781000285062 |c electronic bk. : Mobipocket |9 978-1-000-28506-2 | ||
020 | |a 1000285065 |c electronic bk. : Mobipocket |9 1-000-28506-5 | ||
020 | |a 9781000285055 |c electronic bk. |9 978-1-000-28505-5 | ||
035 | |a (DE-627-1)102559767 | ||
035 | |a (DE-599)KEP102559767 | ||
035 | |a (ORHE)9781000285079 | ||
035 | |a (DE-627-1)102559767 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Jeyanthi, N. |d 1977- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Managing security services in heterogenous networks |b confidentiality, integrity, availability, authentication, and access control |c N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran |
264 | 1 | |a Boca Raton |b CRC Press |c 2021 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace. | ||
650 | 0 | |a Computer networks |x Security measures |x Management | |
650 | 0 | |a Heterogeneous distributed computing systems | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion | |
650 | 4 | |a COMPUTERS / Networking / Security | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a Heterogeneous distributed computing systems | |
700 | 1 | |a Ma, Kun |e VerfasserIn |4 aut | |
700 | 1 | |a Perumal, Thinagaran |e VerfasserIn |4 aut | |
700 | 1 | |a Thandeeswaran, N. |e VerfasserIn |4 aut | |
776 | 1 | |z 9780367457341 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780367457341 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781000285079/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-102559767 |
---|---|
_version_ | 1821494933617377280 |
adam_text | |
any_adam_object | |
author | Jeyanthi, N. 1977- Ma, Kun Perumal, Thinagaran Thandeeswaran, N. |
author_facet | Jeyanthi, N. 1977- Ma, Kun Perumal, Thinagaran Thandeeswaran, N. |
author_role | aut aut aut aut |
author_sort | Jeyanthi, N. 1977- |
author_variant | n j nj k m km t p tp n t nt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)102559767 (DE-599)KEP102559767 (ORHE)9781000285079 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03841nam a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-102559767</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240429114540.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240429s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000285057</subfield><subfield code="9">1-000-28505-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003034049</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-003-03404-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003034047</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-003-03404-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000285079</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">978-1-000-28507-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000285073</subfield><subfield code="c">electronic bk. : EPUB</subfield><subfield code="9">1-000-28507-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000285062</subfield><subfield code="c">electronic bk. : Mobipocket</subfield><subfield code="9">978-1-000-28506-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000285065</subfield><subfield code="c">electronic bk. : Mobipocket</subfield><subfield code="9">1-000-28506-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000285055</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-000-28505-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102559767</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP102559767</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781000285079</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)102559767</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jeyanthi, N.</subfield><subfield code="d">1977-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Managing security services in heterogenous networks</subfield><subfield code="b">confidentiality, integrity, availability, authentication, and access control</subfield><subfield code="c">N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Heterogeneous distributed computing systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Heterogeneous distributed computing systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ma, Kun</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Perumal, Thinagaran</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thandeeswaran, N.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780367457341</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780367457341</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781000285079/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-102559767 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:22:15Z |
institution | BVB |
isbn | 1000285057 9781003034049 1003034047 9781000285079 1000285073 9781000285062 1000285065 9781000285055 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Jeyanthi, N. 1977- VerfasserIn aut Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran Boca Raton CRC Press 2021 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace. Computer networks Security measures Management Heterogeneous distributed computing systems Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion COMPUTERS / Networking / Security COMPUTERS / Security / General Ma, Kun VerfasserIn aut Perumal, Thinagaran VerfasserIn aut Thandeeswaran, N. VerfasserIn aut 9780367457341 Erscheint auch als Druck-Ausgabe 9780367457341 |
spellingShingle | Jeyanthi, N. 1977- Ma, Kun Perumal, Thinagaran Thandeeswaran, N. Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control Computer networks Security measures Management Heterogeneous distributed computing systems Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion COMPUTERS / Networking / Security COMPUTERS / Security / General |
title | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control |
title_auth | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control |
title_exact_search | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control |
title_full | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran |
title_fullStr | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran |
title_full_unstemmed | Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran |
title_short | Managing security services in heterogenous networks |
title_sort | managing security services in heterogenous networks confidentiality integrity availability authentication and access control |
title_sub | confidentiality, integrity, availability, authentication, and access control |
topic | Computer networks Security measures Management Heterogeneous distributed computing systems Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion COMPUTERS / Networking / Security COMPUTERS / Security / General |
topic_facet | Computer networks Security measures Management Heterogeneous distributed computing systems Réseaux d'ordinateurs ; Sécurité ; Mesures ; Gestion COMPUTERS / Networking / Security COMPUTERS / Security / General |
work_keys_str_mv | AT jeyanthin managingsecurityservicesinheterogenousnetworksconfidentialityintegrityavailabilityauthenticationandaccesscontrol AT makun managingsecurityservicesinheterogenousnetworksconfidentialityintegrityavailabilityauthenticationandaccesscontrol AT perumalthinagaran managingsecurityservicesinheterogenousnetworksconfidentialityintegrityavailabilityauthenticationandaccesscontrol AT thandeeswarann managingsecurityservicesinheterogenousnetworksconfidentialityintegrityavailabilityauthenticationandaccesscontrol |