Managing security services in heterogenous networks confidentiality, integrity, availability, authentication, and access control /

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the fou...

Full description

Saved in:
Bibliographic Details
Main Authors: Jeyanthi, N., 1977- (Author), Ma, Kun (Computer scientist) (Author), Perumal, Thinagaran (Author), Thandeeswaran, N. (Author)
Format: Electronic eBook
Language:English
Published: Boca Raton : CRC Press, 2021.
Subjects:
Online Access:Taylor & Francis
OCLC metadata license agreement
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam a2200000Mi 4500
001 9781003034049
003 FlBoTFG
005 20230120125211.0
006 m o d
007 cr |||||||||||
008 201117s2021 flu fo 000 0 eng d
040 |a OCoLC-P  |b eng  |e rda  |e pn  |c OCoLC-P 
020 |a 9781000285055  |q (e-book) 
020 |a 1000285057 
020 |a 9781003034049  |q (electronic bk.) 
020 |a 1003034047  |q (electronic bk.) 
020 |a 9781000285079  |q (electronic bk. : EPUB) 
020 |a 1000285073  |q (electronic bk. : EPUB) 
020 |a 9781000285062  |q (electronic bk. : Mobipocket) 
020 |a 1000285065  |q (electronic bk. : Mobipocket) 
035 |a (OCoLC)1228889365 
035 |a (OCoLC-P)1228889365 
050 4 |a TK5105.59 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
082 0 4 |a 005.8  |2 23 
100 1 |a Jeyanthi, N.,  |d 1977-  |e author.  |9 29470 
245 1 0 |a Managing security services in heterogenous networks  |b confidentiality, integrity, availability, authentication, and access control /  |c N. Jeyanthi, Kun Ma, Thinagaran Perumal, N. Thandeeswaran. 
264 1 |a Boca Raton :  |b CRC Press,  |c 2021. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace. 
588 |a OCLC-licensed vendor bibliographic record. 
650 0 |a Computer networks  |x Security measures  |x Management.  |9 29471 
650 0 |a Heterogeneous distributed computing systems.  |9 29472 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh  |9 29473 
650 7 |a COMPUTERS / Security / General  |2 bisacsh  |9 29474 
700 1 |a Ma, Kun  |c (Computer scientist),  |e author.  |9 29475 
700 1 |a Perumal, Thinagaran,  |e author.  |9 29476 
700 1 |a Thandeeswaran, N.,  |e author.  |9 29477 
856 4 0 |3 Taylor & Francis  |u https://www.taylorfrancis.com/books/9781003034049 
856 4 2 |3 OCLC metadata license agreement  |u http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf 
999 |c 206834  |d 206833