Search the Library Catalogue
| 000 -LEADER | |
|---|---|
| fixed length control field | 02092nam a22002057a 4500 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 250806b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| ISBN | 9780849379215 |
| Paper back/Hardbound | hbk |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Item number | XIA |
| 100 ## - MAIN ENTRY--AUTHOR NAME | |
| Personal name | Xiao, Yang |
| 245 ## - TITLE STATEMENT | |
| Title | Security In Distributed, Grid, Mobile, And Pervasive Computing |
| Statement of responsibility, etc | Yang Xiao |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication | Boca Raton |
| Name of publisher | Auerbach Publications |
| Year of publication | 2007 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Number of Pages | 420 p. |
| Dimensions | 23 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographies and index |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems.A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security.With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical Term | Computer Security |
| Topical Term | Computer networks Security measures |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Koha item type | Reference |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Full call number | Accession Number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Anna Centenary Library | Anna Centenary Library | 3RD FLOOR, A WING | 17.08.2010 | 5500.00 | 005.8 XIA | 144492 | 06.08.2025 | Reference |