pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: INTRUSION DETECTION IN WIRELESS AD-HOC NETWORKS
By: Nabendu Chaki (Editor), Rituparna Chaki (Editor)
Format: Electronic book text

List price: £72.99


We believe that this item is permanently unavailable, and so we cannot source it.

ISBN 10: 1466515678
ISBN 13: 9781466515673
Publisher: TAYLOR & FRANCIS INC
Pub. date: 6 February, 2014
Pages: 258
Synopsis: Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks.This edited volume reviews and analyzes state-of-the-art IDSs for various wireless ad-hoc networks. It includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems.Addresses architecture and organization issuesExamines the different types of routing attacks for WANsExplains how to ensure Quality of Service in secure routingConsiders honesty and trust-based IDS solutionsExplores emerging trends in WAN securityDescribes the blackhole attack detection techniqueSurveying existing trust-based solutions, the book explores the potential of the CORIDS algorithm to provide trust-based solutions for secure mobile applications. Touching on more advanced topics, including security for smart power grids, securing cloud services, and energy-efficient IDSs, this book provides you with the tools to design and build secure next-generation wireless networking environments.
Illustrations: 9 Tables, black and white; 75 Illustrations, black and white
Publication: US
Imprint: CRC Press Inc
Returns: Non-returnable
Some other items by this author:
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCED COMPUTING AND SYSTEMS FOR SECURITY (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. COMPUTER SCIENCE AND ENGINEERING (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY. NETWORKS AND COMMUNICATIONS (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY (PB)
ADVANCES IN NETWORK SECURITY AND APPLICATIONS (PB)
APPLIED COMPUTATION AND SECURITY SYSTEMS (PB)
APPLIED COMPUTATION AND SECURITY SYSTEMS (PB)
BUSINESS STANDARD COMPLIANCE AND REQUIREMENTS VALIDATION USING GOAL MODELS
BUSINESS STANDARD COMPLIANCE AND REQUIREMENTS VALIDATION USING GOAL MODELS (HB)
COMPUTER INFORMATION SYSTEMS - ANALYSIS AND TECHNOLOGIES (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (PB)
COMPUTER NETWORKS & COMMUNICATIONS (NETCOM)
COMPUTER NETWORKS & COMMUNICATIONS (NETCOM) (HB)
CONCURRENCY CONTROL IN DISTRIBUTED SYSTEM USING MUTUAL EXCLUSION (HB)
CONCURRENCY CONTROL IN DISTRIBUTED SYSTEM USING MUTUAL EXCLUSION (PB)
DYNAMIC REVERSE FURTHEST NEIGHBOR
EXPLORING IMAGE BINARIZATION TECHNIQUES (HB)
EXPLORING IMAGE BINARIZATION TECHNIQUES (PB)
EXPLORING NEURAL NETWORKS WITH C#
EXPLORING NEURAL NETWORKS WITH C# (PB)
HYPER-LATTICE ALGEBRAIC MODEL FOR DATA WAREHOUSING (PB)
INTRUSION DETECTION IN WIRELESS AD-HOC NETWORKS (HB)
MOBILE AD-HOC NETWORK AND WIRELESS COMMUNICATIONS (HB)
MOVING OBJECT DETECTION USING BACKGROUND SUBTRACTION (PB)
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (HB)
PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (HB)
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA ENGINEERING (HB)
RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS (PB)
RECENT TRENDS IN NETWORKS AND COMMUNICATIONS (PB)
RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS (PB)
SECURITY IN IOT (HB)
TRENDS IN NETWORK AND COMMUNICATIONS (PB)

TOP SELLERS IN THIS CATEGORY
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
Introduction to Computer Security (Paperback)
Pearson Education Limited
Our Price : £67.52
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
Threat Modeling (Paperback)
John Wiley & Sons Inc
Our Price : £45.90
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket