<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" ID="1163">
<titleInfo>
<title>Cyber security standards, practices and industrial applications:</title>
<subTitle>systems and methodologies</subTitle>
</titleInfo>
<name type="Personal Name" authority="">
<namePart>Zubairi, Junaid Ahmed</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<name type="Personal Name" authority="">
<namePart>Mahboob, Athar</namePart>
<role><roleTerm type="text">Primary Author</roleTerm></role>
</name>
<typeOfResource manuscript="yes" collection="yes">mixed material</typeOfResource>
<genre authority="marcgt">bibliography</genre>
<originInfo>
<place><placeTerm type="text"></placeTerm></place>
<publisher>IGI Global</publisher>
<dateIssued>2012</dateIssued>
<issuance>monographic</issuance>
<edition></edition>
</originInfo>
<language>
<languageTerm type="code">en</languageTerm>
<languageTerm type="text">ENGLISH</languageTerm>
</language>
<physicalDescription>
<form authority="gmd">Text</form>
<extent>xviii, 316hlm.: ind.; ...cm.</extent>
</physicalDescription>
<note>The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing and communications environment. Due to their unique features such as shared medium, limited resources, and dynamic topology, wireless ad hoc networks are vulnerable to a variety of potential attacks. However, the common security measures employed for wired networks are not enough to protect the nodes of the
networks against complex attacks. Therefore, a new line of defense, called intrusion detection, has been added. In this chapter, first we introduce the main wireless technologies along with their characteristics. Then, a description of the attacks that can be mounted on these networks is given. A separate section will review and compare the most recent intrusion detection techniques for wireless ad hoc networks. Finally, based on the current state of the art, the conclusions, and major challenges are discussed.</note>
<subject authority=""><topic>Computer networks--Security measures</topic></subject>
<classification>005.8</classification><identifier type="isbn"></identifier><location>
<physicalLocation>Repository Universitas Langlangbuana Sistem Repository Elektronik Skripsi, Tesis, Desertasi dan Penelitian Dosen Universitas Langlangbuana</physicalLocation>
<shelfLocator>005.8 ZUB c</shelfLocator>
<holdingSimple>
<copyInformation>
<numerationAndChronology type="1">B184</numerationAndChronology>
<sublocation>My Library</sublocation>
<shelfLocator>005.8 ZUB c</shelfLocator>
</copyInformation>
</holdingSimple>
</location>
<slims:digitals>
<slims:digital_item id="6475" url="" path="/Cyber Security Standards, Practices and Industrial Applications - Mahboob, Athar,Zubairi, Junaid Ahmed.pdf" mimetype="application/pdf">Cyber security standards, practices and industrial applications: systems and methodologies</slims:digital_item>
</slims:digitals><slims:image>cover_cyber_security_standards%2C_practices_and_industrial_applications.PNG.PNG</slims:image>
<recordInfo>
<recordIdentifier>1163</recordIdentifier>
<recordCreationDate encoding="w3cdtf">2022-09-14 10:44:15</recordCreationDate>
<recordChangeDate encoding="w3cdtf">2022-09-14 10:44:34</recordChangeDate>
<recordOrigin>machine generated</recordOrigin>
</recordInfo></mods></modsCollection>