Online social networks security : (Record no. 73878)

000 -LEADER
fixed length control field 03836cam a2200577Ii 4500
001 - CONTROL NUMBER
control field 9781003107378
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220531132542.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210111t20212021flua ob 001 0 eng d
040 ## - Cataloging Source
-- OCoLC-P
-- eng
-- rda
-- OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000347111
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000347117
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000347197
-- electronic publication
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000347192
-- electronic publication
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003107378
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003107370
-- electronic book
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000347159
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 100034715X
-- (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367619794
-- hardcover
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0367619792
-- hardcover
024 7# -
-- 10.1201/9781003107378
-- doi
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1230121458
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1230121458
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.59
Item number .G86 2021
072 #7 -
-- COM
-- 043000
-- bisacsh
072 #7 -
-- COM
-- 060040
-- bisacsh
072 #7 -
-- COM
-- 060140
-- bisacsh
072 #7 -
-- UR
-- bicssc
082 04 -
-- 302.23/1028558
-- 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gupta, Brij,
Dates associated with a name 1982-
Relator term author.
245 10 - TITLE STATEMENT
Title Online social networks security :
Remainder of title principles, algorithm, applications, and perspectives /
Statement of responsibility, etc. Brij B. Gupta & Somya Ranjan Sahoo.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 -
-- Boca Raton :
-- CRC Press,
-- 2021.
264 #4 -
-- ©2021
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xv, 104 pages)
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
490 1# -
-- CRC focus
520 ## -
-- In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another's accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Online social networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Networking / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Internet / Security
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sahoo, Somya Ranjan,
Relator term author.
856 40 -
-- Taylor & Francis
-- https://www.taylorfrancis.com/books/9781003107378
856 42 -
-- OCLC metadata license agreement
-- http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571