Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

A Study of Black Hole Attack Solutions, Elahe Fazeldehkordi


Варианты приобретения
Цена: 8083.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Elahe Fazeldehkordi
Название:  A Study of Black Hole Attack Solutions
ISBN: 9780128053676
Издательство: Elsevier Science
Классификация:



ISBN-10: 0128053674
Обложка/Формат: Paperback
Страницы: 122
Вес: 0.22 кг.
Дата издания: 04.11.2015
Язык: English
Размер: 153 x 230 x 10
Подзаголовок: On aodv routing protocol in manet
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Европейский союз
Описание: Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.


Theory And Practice Of Cryptography Solutions For Secure Information Syste

Автор: El?i, Pieprzyk, Chefranov, Orgun
Название: Theory And Practice Of Cryptography Solutions For Secure Information Syste
ISBN: 1466640308 ISBN-13(EAN): 9781466640306
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 28413.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: <em>Theory and Practice of Cryptography Solutions for Secure Information Systems</em> explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the <em>Advances in Information Security, Privacy, and Ethics series collection</em>.

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions

Автор: Wright Joshua, Cache Johnny
Название: Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
ISBN: 0071827633 ISBN-13(EAN): 9780071827638
Издательство: McGraw-Hill
Рейтинг:
Цена: 11324.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.

Innovative Security Solutions for Information Technology and Communications

Автор: Bica
Название: Innovative Security Solutions for Information Technology and Communications
ISBN: 3319472372 ISBN-13(EAN): 9783319472379
Издательство: Springer
Рейтинг:
Цена: 6988.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Security for Information Technology and Communications, SECITC 2016, held in Bucharest, Romania, in June 2016. The 16 revised full papers were carefully reviewed and selected from 35 submissions.

Protecting Critical Infrastructures Against Cyber-Attack

Автор: Lukasik
Название: Protecting Critical Infrastructures Against Cyber-Attack
ISBN: 0198530161 ISBN-13(EAN): 9780198530169
Издательство: Taylor&Francis
Рейтинг:
Цена: 3980.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western
governments.

Insider Attack and Cyber Security

Автор: Salvatore J. Stolfo; Steven M. Bellovin; Shlomo He
Название: Insider Attack and Cyber Security
ISBN: 144194589X ISBN-13(EAN): 9781441945891
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The book includes chapters by world renowned experts in this field.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия