Due to increasing sophistication in attackers' ability to launch attacks and growing dependence of users on the Internet, development of effective security mechanism has become a necessity while being a challenging task.
Network and Information Security takes a holistic view for understanding of different types of network and information security threats, designing tools and mechanisms to defend against various threats. Accordingly, it covers audio watermarking scheme for secure distribution of audio files, fusion of fingerprint and iris biometrics using BPSO, meta ensemble classifier for anomaly based IDS, network security tools and systems, formal verification of firewall anomalies, detection of Botnets, dynamic SQL classification, trust in web services and cloud computing environment, Identity Based Signatures (IBS), Side Channel Attacks (SCA), symmetric key generation using chaos theory, identity privacy in UMTS, and security vulnerabilities in CRNs.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.