All ebooks by Iraj Sadegh Amiri in PDF and EPUB
Readzis program recommandation

All ebooks by Iraj Sadegh Amiri in PDF and EPUB


5  Book(s)
Download this eBook Audio Content Security
Add to my wish list

Audio Content Security


Iraj Sadegh Amiri , Sogand Ghorbani


Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...

Publication date: 2016-07-16
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Theoretical and Experimental Methods for Defending Against DDoS Attacks
Add to my wish list

Theoretical and Experimental Methods for Defending Against DDoS Attacks


Iraj Sadegh Amiri , Mohammad Reza Khalifeh Soltanian


Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Publication date: 2015-11-10
Format: epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook A Study of Black Hole Attack Solutions
Add to my wish list

A Study of Black Hole Attack Solutions


Iraj Sadegh Amiri , Elahe Fazeldehkordi , Oluwatobi Ayodeji Akanbi


Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Publication date: 2015-11-03
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook A Machine-Learning Approach to Phishing Detection and Defense
Add to my wish list

A Machine-Learning Approach to Phishing Detection and Defense


Iraj Sadegh Amiri , E. Fazeldehkordi , O.A. Akanbi


Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A...

Publication date: 2014-12-05
Format: epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Optimizing IEEE 802.11i Resource and Security Essentials
Add to my wish list

Optimizing IEEE 802.11i Resource and Security Essentials


Iraj Sadegh Amiri , Iman Saberi , Parisa Naraei


In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for...

Publication date: 2014-12-05
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés