Security In Distributed, Grid, Mobile, And Pervasive Computing (Record no. 578697)

MARC details
000 -LEADER
fixed length control field 02092nam a22002057a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250806b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780849379215
Paper back/Hardbound hbk
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number XIA
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Xiao, Yang
245 ## - TITLE STATEMENT
Title Security In Distributed, Grid, Mobile, And Pervasive Computing
Statement of responsibility, etc Yang Xiao
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Boca Raton
Name of publisher Auerbach Publications
Year of publication 2007
300 ## - PHYSICAL DESCRIPTION
Number of Pages 420 p.
Dimensions 23 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographies and index
520 ## - SUMMARY, ETC.
Summary, etc Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Security
Topical Term Computer networks Security measures
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Reference
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Cost, normal purchase price Full call number Accession Number Price effective from Koha item type
        Anna Centenary Library Anna Centenary Library 3RD FLOOR, A WING 17.08.2010 5500.00 005.8 XIA 144492 06.08.2025 Reference

Find us on the map