Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Indexed In: SCOPUS
Release Date: November, 2013|Copyright: © 2014 |Pages: 330
DOI: 10.4018/978-1-4666-4789-3
ISBN13: 9781466647893|ISBN10: 1466647892|EISBN13: 9781466647909
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels.

Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Database and System Security
  • Emerging Technologies
  • Security Threats & Countermeasures
  • Ubiquitous Computing Security
  • Web 2.0 Security
  • Wireless Network Security
Reviews & Statements

Information and computer scientists report on their research and review literature on computer network security. Their topics include a synthesis of supervised approaches for intrusion detection systems, applying game theory in securing wireless sensor networks by minimizing battery usage, identity-based encryption protocol for privacy and authentication in wireless networks, methods and assessments for distinguishing human users from bots, and formal reliability analysis of engineering systems.

– ProtoView Book Abstracts (formerly Book News, Inc.)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Abdelmalek Amine received an engineering degree in Computer Science from the Computer Science department of Djillali Liabes University of Sidi-Belabbes-Algeria, received the Magister diploma in Computational Science and PhD from Djillali Liabes University in collaboration with Joseph Fourier University of Grenoble. His research interests include data mining, text mining, ontology, classification, clustering, neural networks, and biomimetic optimization methods. He participates in the program committees of several international conferences and on the editorial boards of international journals. Dr. Amine is the head of GeCoDe-knowledge management and complex data-laboratory at UTM University of Saida, Algeria; he also collaborates with the “knowledge base and database” team of TIMC laboratory at Joseph Fourier University of Grenoble.
Otmane Ait Mohamed received his Ph.D. (1996) in Computer Science from Université Henri Poincaré, Nancy 1. Before his arrival at Concordia in 2002, he worked as a Postdoctoral Fellow at Université de Montréal, a Research Scientist at Cistel, and a Senior Verification Engineer at Nortel Networks in Ottawa. Dr. Otmane Ait Mohamed was promoted to Associate Professor in the Department of Electrical and Computer Engineering in June 2008. Dr. Ait Mohamed has been working on formal verification for hardware and communication protocol since 1992. He contributed to the development of the MDG tool, a formal verification tool developed at the University of Montreal from 1996-1998. He joined Cistel Technology, then Nortel Networks, where he introduced the use of formal method techniques in the hardware design flow to identify critical issues in the protocols used in Nortel’s Virtual Processor Subsystems. His work with the verification team consisted of verifying four different ASICs used in the communication data switch. His main research areas include hardware model checking, assertion-based verification, automatic test generations, and FPGA-based design and verification. Since joining Concordia, Dr. Ait Mohamed has published more than 80 papers in refereed conference proceedings and 30 journal papers. He is the principal or co-investigator of several team grants from agencies such as NATEQ, MDEIE, and various companies. Dr. Ait Mohamed has supervised or co-supervised to completion 25 M.A.Sc. students, 4 Ph.D. students, and 2 postdoctoral Fellows. Dr. Ait Mohamed also served as a reviewer for several related conferences and journals, and he maintains collaborations with AMD, ST, Synopsys, Texas Instruments, and Qualcomm. Dr. Ait Mohamed was the program co-chair for the prestigious 21st TPHOLs conference in 2008. He is a registered professional engineer with the Ordre des ingénieurs du Québec, member of IEEE, and member of ACM.
Boualem Benatallah received a PhD degree from Grenoble 1 University (France). He is professor and research group leader at the School of Computer Science (CSE), University of New South Wales (UNSW, Sydney, Australia). His main research interests are developing fundamental concepts and techniques in service composition, integration, and business processes management. He has published more than 170 refereed papers, including more than 40 journal papers. He has a very strong international track record demonstrated by the high citations of his work, some of which are considered seminal in the field of services composition. He also has strong collaboration with Industry including projects, consultancy, and patents. Boualem has been PC co-chair of number of international conferences (BPM'05, ICSOC'05, WISE'07, ICWE'2010, IEEE/ACM WI'11, IEEE SOCA'11). He is member of the steering committee of BPM and ICSOC. He is member of the editorial board of numerous international journals and series including Springer Series on Services Science. He is member of the steering committees of ICSOC and BPM. His recent work focuses is on digital services engineering and innovation.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.