|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Jahankhani, Hamid |
Wireless Networks |
I12814 |
2023 |
eBook |
|
2 |
Jahankhani, Hamid |
AI, Blockchain and Self-Sovereign Identity in Higher Education |
I12743 |
2023 |
eBook |
|
3 |
Granados, Oscar M |
Corruption Networks |
I11782 |
2021 |
eBook |
|
4 |
Akira Namatame and Shu-Heng Chen |
Agent-based modeling and network dynamics |
OB1127 |
|
eBook |
|
5 |
Guido Caldarelli |
Data science and complex networks |
OB1034 |
|
eBook |
|
6 |
Andrew S. Tanenbaum |
Computer networks |
PP0013 |
2011 |
Book |
|
7 |
James F.Kurose |
Computer networking: a top- down approach |
PP0014 |
2017 |
Book |
|
8 |
Richard R. Brooks |
Introduction to computer and network security: Navigating Shades of Gray |
025955 |
2014 |
Book |
|
9 |
Ajit Pal |
Data communication and computer networks |
025540 |
2014 |
Book |
|
10 |
Shivendra Panwar |
TCP/IP essentials : A lab-based approach |
020317 |
2004 |
Book |
|
|
1.
|
|
Title | Wireless Networks : Cyber Security Threats and Countermeasures |
Author(s) | Jahankhani, Hamid;El Hajjar, Ayman |
Publication | Cham, 1. Imprint: Springer
2. Springer International Publishing, 2023. |
Description | VI, 348 p. 161 illus., 129 illus. in color : online resource |
Abstract Note | In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NFC, wireless sensors, wireless LANs, ZigBee, GSM, and others have their own challenges and security threats. This book addresses some of these challenges focusing on the implication, impact, and mitigations of the stated issues. The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of wireless networks but also the adversarial application of wireless networks and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting, and addressing wireless challenges and threats. The book also looks ahead and forecasts what attacks can be carried out in the future through the malicioususe of the wireless networks if sufficient defenses are not implemented. The research contained in the book fits well into the larger body of work on various aspects of wireless networks and cyber-security. The book provides a valuable reference for cyber-security experts, practitioners, and network security professionals, particularly those interested in the security of the various wireless networks. It is also aimed at researchers seeking to obtain a more profound knowledge in various types of wireless networks in the context of cyber-security, wireless networks, and cybercrime. Furthermore, the book is an exceptional advanced text for Ph.D. and master???s degree programs in cyber-security, network security, cyber-terrorism, and computer science who are investigating or evaluating a security of a specific wireless network. Each chapter is written by an internationally-renowned expert who has extensive experience in law enforcement, industry, or academia. Furthermore, this bookblends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills |
ISBN,Price | 9783031336317 |
Keyword(s) | 1. Computer crimes
2. COMPUTER NETWORKS
3. Cybercrime
4. Data and Information Security
5. Data protection
6. EBOOK - SPRINGER
7. Mobile and Network Security
8. Mobile communication systems
9. Wireless and Mobile Communication
10. Wireless communication systems
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12814 |
|
|
On Shelf |
|
|
|
|
2.
|
|
Title | AI, Blockchain and Self-Sovereign Identity in Higher Education |
Author(s) | Jahankhani, Hamid;Jamal, Arshad;Brown, Guy;Sainidis, Eustathios;Fong, Rose;Butt, Usman J |
Publication | Cham, 1. Imprint: Springer
2. Springer Nature Switzerland, 2023. |
Description | VI, 313 p. 151 illus., 132 illus. in color : online resource |
Abstract Note | This book aims to explore the next generation of online learning challenges including the security and privacy issues of digital transformation strategies that is required in teaching and learning. Also, what efforts does the industry need to invest in changing mind-sets and behaviours of both students and faculty members in adoption of virtual and blended learning? The book provides a comprehensive coverage of not only the technical and ethical issues presented by the use of AI, blockchain and self-sovereign identity, but also the adversarial application of AI and its associated implications. The authors recommend a number of novel approaches to assist in better detecting, thwarting and addressing AI challenges in higher education. The book provides a valuable reference for cyber security experts and practitioners, network security professionals and higher education strategist and decision-makers. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cyber security and AI in higher education. Each chapter is written by an internationally renowned expert who has extensive experience in industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills |
ISBN,Price | 9783031336270 |
Keyword(s) | 1. ARTIFICIAL INTELLIGENCE
2. COMPUTER NETWORKS
3. Data and Information Security
4. Data protection
5. EBOOK - SPRINGER
6. Education, Higher
7. HIGHER EDUCATION
8. Mobile and Network Security
|
Item Type | eBook |
Multi-Media Links
media link description
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I12743 |
|
|
On Shelf |
|
|
|
|
3.
|
|
Title | Corruption Networks : Concepts and Applications |
Author(s) | Granados, Oscar M;Nicol??s-Carlock, Jos?? R |
Publication | Cham, Springer International Publishing, 2021. |
Description | XVI, 158 p. 40 illus., 34 illus. in color : online resource |
Abstract Note | This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem. The research results strengthen the importance of evidence-based approaches in the fight against corruption in all its forms, and foster the discussion about the best ways to convert the obtained knowledge into public policy. The contributed chapters provide comprehensive and multidisciplinary approaches to handle the non-trivial structural and dynamical aspects that characterize the modern social, economic, political and technological systems where corruption takes place. This book will serve a broad multi-disciplinary audience from natural to social scientists, applied mathematicians, including law and policymakers |
ISBN,Price | 9783030814847 |
Keyword(s) | 1. COMPLEX SYSTEMS
2. COMPUTATIONAL COMPLEXITY
3. COMPUTER NETWORKS
4. EBOOK
5. EBOOK - SPRINGER
6. Mathematics in Business, Economics and Finance
7. Political planning
8. POLITICAL SCIENCE
9. Public policy
10. Social sciences???Mathematics
11. SYSTEM THEORY
|
Item Type | eBook |
Multi-Media Links
Please Click here for eBook
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
I11782 |
|
|
On Shelf |
|
|
|
|
8.
|
|
Title | Introduction to computer and network security: Navigating Shades of Gray |
Author(s) | Richard R. Brooks |
Publication | Boca Taton, CRC Press, 2014. |
Description | xxiv, 205p. |
Abstract Note | Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.
The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. |
ISBN,Price | 9781439860717 : UKP 49.99(HB) |
Classification | 681.324
|
Keyword(s) | 1. COMPUTER NETWORK SECURITY
2. COMPUTER NETWORKS
3. CRYPTOGRAPHY
4. NETWORK SECURITY
5. POLYMORPHIC VIRUS
6. WEB SECURITY
|
Item Type | Book |
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
025955 |
|
681.324/BRO/025955 |
On Shelf |
|
|
|
+Copy Specific Information | |