el cat en
База данных: Electronic library
Page 1, Results: 3
Отмеченные записи: 0
1.
Подробнее
DDC 610.285
M 46
Medical data security for bioengineers / / Butta Singh, Barjinder Singh Saini, Dilbag Singh, Anukul Pandey, [editors]. - 4018/978-1-5225-7952-6. - Hershey, PA : : IGI Global,, [2019]. - 1 online resource ( час. мин.), 4018/978-1-5225-7952-6. - (Advances in bioinformatics and biomedical engineering (ABBE) book series). - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/B8BE0FB4-F8FF-460F-B006-4EC67F8D7DC5. - ISBN 9781522579533 (electronic book). - ISBN 1522579532 (electronic book)
Online resource; title from digital title page (viewed on April 01, 2019).
Параллельные издания: Print version: : Medical data security for bioengineers. - Hershey, PA : Medical Information Science Reference, [2019]. - ISBN 9781522579526
Содержание:
Advancements in data security and privacy techniques used in IoT based hospital applications / Ankita Tiwari, Raghuvendra Tripathi -- Engineering solutions for the future of modern medicine / Surendar Aravindhan, Kavitha M, Synthesishub -- Optimization techniques for the multilevel thresholding of the medical images / Taranjit Kaur, Barjinder Saini -- Bernoulli's chaotic map based 2D ECG image steganography : a medical data security approach / Anukul Pandey, Barjinder Saini, Butta Singh, Neetu Sood -- Cloud computing technologies in healthcare : importance of cloud in e-healthcare / R. Suganya, Sujatha S. -- Techniques for biomedical data security / Harminder Kaur, Sharvan Kumar Pahuja -- An IWT based blend of cryptography and steganography for securing confidential data in biomedical signals / Neetika Soni, D. Indu Saini, Butta Singh -- Changes in physiological dynamics of EEG during meditation using Wavelet families / Neha Gupta -- Compression of biomedical images using compressive sensing / Meenakshi Sood, Charu, Urvashi, Shruti Jain -- Electrocardiogram beat classification using BAT optimized fuzzy KNN classifier / Atul Kumar Verma, Indu Saini, Barjinder Singh Saini.
~РУБ DDC 610.285
Рубрики: Computer security.
Medical informatics.
Confidential communications.
Computer Security
Medical Informatics
Confidentiality
Signal Processing, Computer-Assisted
Cloud Computing
Sécurité informatique.
Médecine--Informatique.
Secret professionnel.
HEALTH & FITNESS--Holism.
HEALTH & FITNESS--Reference.
MEDICAL--Alternative Medicine.
MEDICAL--Atlases.
MEDICAL--Essays.
MEDICAL--Family & General Practice.
MEDICAL--Holistic Medicine.
MEDICAL--Osteopathy.
Computer security.
Medical informatics.
Аннотация: "This book examines the issues facing medical data security in healthcare systems and applications. It also explores the advancements in engineering applications to healthcare technologies, biomedical information security and data privacy, and cloud computing technologies in healthcare"--Provided by publisher
Доп.точки доступа:
Singh, Butta, (1981-) \editor.\
Saini, Barjinder Singh, (1970-) \editor.\
Singh, Dilbag, \editor.\
Pandey, Anukul, \editor.\
M 46
Medical data security for bioengineers / / Butta Singh, Barjinder Singh Saini, Dilbag Singh, Anukul Pandey, [editors]. - 4018/978-1-5225-7952-6. - Hershey, PA : : IGI Global,, [2019]. - 1 online resource ( час. мин.), 4018/978-1-5225-7952-6. - (Advances in bioinformatics and biomedical engineering (ABBE) book series). - Includes bibliographical references. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/B8BE0FB4-F8FF-460F-B006-4EC67F8D7DC5. - ISBN 9781522579533 (electronic book). - ISBN 1522579532 (electronic book)
Online resource; title from digital title page (viewed on April 01, 2019).
Параллельные издания: Print version: : Medical data security for bioengineers. - Hershey, PA : Medical Information Science Reference, [2019]. - ISBN 9781522579526
Содержание:
Advancements in data security and privacy techniques used in IoT based hospital applications / Ankita Tiwari, Raghuvendra Tripathi -- Engineering solutions for the future of modern medicine / Surendar Aravindhan, Kavitha M, Synthesishub -- Optimization techniques for the multilevel thresholding of the medical images / Taranjit Kaur, Barjinder Saini -- Bernoulli's chaotic map based 2D ECG image steganography : a medical data security approach / Anukul Pandey, Barjinder Saini, Butta Singh, Neetu Sood -- Cloud computing technologies in healthcare : importance of cloud in e-healthcare / R. Suganya, Sujatha S. -- Techniques for biomedical data security / Harminder Kaur, Sharvan Kumar Pahuja -- An IWT based blend of cryptography and steganography for securing confidential data in biomedical signals / Neetika Soni, D. Indu Saini, Butta Singh -- Changes in physiological dynamics of EEG during meditation using Wavelet families / Neha Gupta -- Compression of biomedical images using compressive sensing / Meenakshi Sood, Charu, Urvashi, Shruti Jain -- Electrocardiogram beat classification using BAT optimized fuzzy KNN classifier / Atul Kumar Verma, Indu Saini, Barjinder Singh Saini.
Рубрики: Computer security.
Medical informatics.
Confidential communications.
Computer Security
Medical Informatics
Confidentiality
Signal Processing, Computer-Assisted
Cloud Computing
Sécurité informatique.
Médecine--Informatique.
Secret professionnel.
HEALTH & FITNESS--Holism.
HEALTH & FITNESS--Reference.
MEDICAL--Alternative Medicine.
MEDICAL--Atlases.
MEDICAL--Essays.
MEDICAL--Family & General Practice.
MEDICAL--Holistic Medicine.
MEDICAL--Osteopathy.
Computer security.
Medical informatics.
Аннотация: "This book examines the issues facing medical data security in healthcare systems and applications. It also explores the advancements in engineering applications to healthcare technologies, biomedical information security and data privacy, and cloud computing technologies in healthcare"--Provided by publisher
Доп.точки доступа:
Singh, Butta, (1981-) \editor.\
Saini, Barjinder Singh, (1970-) \editor.\
Singh, Dilbag, \editor.\
Pandey, Anukul, \editor.\
2.
Подробнее
DDC 005.88
B 24
Barker, Dylan.
Malware Analysis Techniques : : Tricks for the Triage of Adversarial Software. / Dylan. Barker. - Birmingham : : Packt Publishing, Limited,, 2021. - 1 online resource (282 pages). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/81D58816-901D-485C-B892-3ED17CBC738B. - ISBN 9781839210068 (electronic book). - ISBN 1839210060 (electronic book)
Параллельные издания: Print version: : Barker, Dylan. Malware Analysis Techniques. - Birmingham : Packt Publishing, Limited, ©2021
~РУБ DDC 005.88
Рубрики: Malware (Computer software)
Computer security.
Computer Security
Logiciels malveillants.
Sécurité informatique.
Computer security.
Malware (Computer software)
B 24
Barker, Dylan.
Malware Analysis Techniques : : Tricks for the Triage of Adversarial Software. / Dylan. Barker. - Birmingham : : Packt Publishing, Limited,, 2021. - 1 online resource (282 pages). - URL: https://library.dvfu.ru/lib/document/SK_ELIB/81D58816-901D-485C-B892-3ED17CBC738B. - ISBN 9781839210068 (electronic book). - ISBN 1839210060 (electronic book)
Параллельные издания: Print version: : Barker, Dylan. Malware Analysis Techniques. - Birmingham : Packt Publishing, Limited, ©2021
Рубрики: Malware (Computer software)
Computer security.
Computer Security
Logiciels malveillants.
Sécurité informatique.
Computer security.
Malware (Computer software)
3.
Подробнее
DDC 005.8
T 40
Tevault, Donald A. ,
Mastering Linux security and hardening : : secure your Linux server and protect it from intruders, malware attacks, and other external threats / / Donald A. Tevault. - 1788620307. - Birmingham, UK : : Packt Publishing,, 2018. - 1 online resource : : il ( час. мин.), 1788620307. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/54EB63C0-9F96-4DED-8D44-AA18E5A9656B. - ISBN 9781788625067 (electronic bk.). - ISBN 1788625064 (electronic bk.). - ISBN 1788620305. - ISBN 9781788620307
Online resource; title from PDF title page (EBSCO, viewed March 25, 2019)
Параллельные издания:
Содержание:
Running Linux in a virtual environment -- Securing user accounts -- Securing your server with a firewall -- Encrypting and SSH hardening -- Mastering discretionary access control -- Access control lists and shared directory management -- Implementing mandatory access control with SELinux and AppArmor -- Scanning, auditing, and hardening -- Vulnerability scanning and intrusion detection -- Security tips and tricks for the busy bee.
~РУБ DDC 005.8
Рубрики: Computer security.
Computer security--Standards.
Computer Security
Sécurité informatique--Normes.
Sécurité informatique.
Linux.
Computer security.
Computer networking & communications.
COMPUTERS--Operating Systems--Linux.
COMPUTERS--Security--General.
Computer security.
Аннотация: The author presents a guide to mastering the art of preventing Linux systems from getting compromised. Learn how to perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and more. This book has coverage of techniques that will help prevent attackers from breaching systems, covering topics such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, and protecting user accounts.
T 40
Tevault, Donald A. ,
Mastering Linux security and hardening : : secure your Linux server and protect it from intruders, malware attacks, and other external threats / / Donald A. Tevault. - 1788620307. - Birmingham, UK : : Packt Publishing,, 2018. - 1 online resource : : il ( час. мин.), 1788620307. - URL: https://library.dvfu.ru/lib/document/SK_ELIB/54EB63C0-9F96-4DED-8D44-AA18E5A9656B. - ISBN 9781788625067 (electronic bk.). - ISBN 1788625064 (electronic bk.). - ISBN 1788620305. - ISBN 9781788620307
Online resource; title from PDF title page (EBSCO, viewed March 25, 2019)
Параллельные издания:
Содержание:
Running Linux in a virtual environment -- Securing user accounts -- Securing your server with a firewall -- Encrypting and SSH hardening -- Mastering discretionary access control -- Access control lists and shared directory management -- Implementing mandatory access control with SELinux and AppArmor -- Scanning, auditing, and hardening -- Vulnerability scanning and intrusion detection -- Security tips and tricks for the busy bee.
Рубрики: Computer security.
Computer security--Standards.
Computer Security
Sécurité informatique--Normes.
Sécurité informatique.
Linux.
Computer security.
Computer networking & communications.
COMPUTERS--Operating Systems--Linux.
COMPUTERS--Security--General.
Computer security.
Аннотация: The author presents a guide to mastering the art of preventing Linux systems from getting compromised. Learn how to perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and more. This book has coverage of techniques that will help prevent attackers from breaching systems, covering topics such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, and protecting user accounts.
Page 1, Results: 3