Handbook of Research on Threat Detection and Countermeasures in Network Security

Handbook of Research on Threat Detection and Countermeasures in Network Security

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Alaa Hussein Al-Hamami (Amman Arab University, Jordan) and Ghossoon M. Waleed al-Saadoon (Applied Sciences University, Bahrain)
Indexed In: SCOPUS
Release Date: October, 2014|Copyright: © 2015 |Pages: 426
DOI: 10.4018/978-1-4666-6583-5
ISBN13: 9781466665835|ISBN10: 1466665831|EISBN13: 9781466665842
Hardcover:
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$325.00
TOTAL SAVINGS: $325.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$390.00
TOTAL SAVINGS: $390.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*
Description & Coverage
Description:

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community.

The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Attack Methods
  • Authentication Techniques
  • Biometric Security
  • Cryptography Techniques
  • Cyber Security
  • Database Protection
  • Digital Signatures
  • Security Simulation
  • Steganography
Indices
Table of Contents
Search this Book:
Reset
Editor Biographies
Alaa H. Al-Hamami is presently Professor of Database Security and Dean of Computer Sciences and Informatics College, Amman Arab University, Jordan. He received his PhD and MSc from East Anglia University and Loughborough University of Technology, UK, respectively. He is a reviewer for several National and International journals and a keynote speaker for many conferences. He is supervising PhD, Msc, and Diploma theses. His research is focused on Distributed Databases, Data warehouse, Data Mining, Cryptography, Steganography, and Network Security. Prof. Al-Hamami has published seventeen books in Computer Philosophy and other Computer topics, and more than 160 research papers, in addition to several chapters in IGI Global and Springer publications. He is Chief Editor and Editor for several magazines in addition to his participation in project research evaluations.
Dr.Ghosson Mohammed Waleed Al-Saadoon is presently an expert of Security Network and Databas and she is a Director of Academic Staff performance development Unit, since 2010 till now, at the Applied Science University, in the Kingdom of Bahrain. Dr. Al-Saadoon has a Ph.D, Ms.C, and Higher Diploma in Computer Science. She received her Bs.C in Computers and Statistics. She occupied several positions in different levels as: Head of Management Information System (MIS) Department, ASU, Bahrain, Faculty member at the Computer & Communication Engineering School, University Malaysia Perlis UniMap 2007-2009. Also she was a Dean Deputy of the Institute for Post graduate studies of Informatics (ICCI), Iraq. Administrative for academic staff for postgraduate studies .Dr. Al-Saadoon has published more than 25 research paper in several International journals. Dr. Al-Saadoon has supervised Postgraduate Students in Ph.D & Ms.C courses, and Higher Diploma in Iraq, Malaysia and Bahrain. Dr. Al-Saadoon has been a reviewer and editorial member for many journals such as IEEE Transactions on Mobile Computing. She was a member in the ICED2008 conference, Technical Program Committee and a Reviewer in the ICED2008 and many others. Dr. Al-Sadoon has awarded from ”Marqu’s Who's Who in the World”, Selected as one of the original publishers in America for the year 2013. She was also awarded by the Ministry of Science Technology and Innovation (MOSTI) for being one of the 500 recognized people, Malaysia 2009.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.