𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Computer and Information Security Handbook || Wireless Sensor Network Security

✍ Scribed by Kupwade Patil, Harsh


Book ID
121012366
Publisher
Elsevier
Year
2013
Tongue
English
Weight
761 KB
Edition
2
Category
Article
ISBN
0123943973

No coin nor oath required. For personal study only.

✦ Synopsis


TheΒ second editionΒ of this comprehensive handbook of computer and information securityΒ provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise.

The book is organized intoΒ 10 parts comprised ofΒ 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber warfare and security, encryption technology, privacy, data storage, physical security, and a host of advanced security topics. New to this edition are chapters on intrusion detection, securing the cloud, securing web apps, ethical hacking, cyber forensics, physical security, disaster recovery, cyber attack deterrence, and more.

  • Chapters by leaders in the field on theory and practice of computer and information security technology, allowing the reader to develop a new level of technical expertise
  • Comprehensive and up-to-date coverage of security issues allows the reader to remain current and fully informed from multiple viewpoints
  • Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions

πŸ“œ SIMILAR VOLUMES


Secure median computation in wireless se
✍ Sankardas Roy; Mauro Conti; Sanjeev Setia; Sushil Jajodia πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 633 KB

Wireless sensor networks (WSNs) have proven to be useful in many applications, such as military surveillance and environment monitoring. To meet the severe energy constraints in WSNs, several researchers have proposed to use the in-network data aggregation technique (i.e., combining partial results