Information Security : foundations, technologies and applications
The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in inform...
Saved in:
Other Authors: | , |
---|---|
Format: | eBook |
Language: | English |
Published: |
London, United Kingdom :
The Institution of Engineering and Technology,
2018.
|
Series: | IET security series ;
1. |
Subjects: | |
ISBN: | 9781849199766 1849199760 9781523116782 1523116781 9781849199742 1849199744 |
Physical Description: | 1 online resource (xii, 404 pages) : illustrations |
LEADER | 05049cam a2200469 i 4500 | ||
---|---|---|---|
001 | kn-on1038496157 | ||
003 | OCoLC | ||
005 | 20240717213016.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 180602t20182018enka ob 001 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d CDN |d UIU |d MERUC |d OCLCF |d OTZ |d STF |d N$T |d OCLCQ |d IN0 |d XPJ |d LVT |d U3G |d YDX |d CUS |d KNOVL |d OCLCQ |d K6U |d UKAHL |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 9781849199766 |q (electronic bk.) | ||
020 | |a 1849199760 |q (electronic bk.) | ||
020 | |a 9781523116782 |q (electronic bk.) | ||
020 | |a 1523116781 |q (electronic bk.) | ||
020 | |z 9781849199742 |q (hardback) | ||
020 | |z 1849199744 |q (hardback) | ||
035 | |a (OCoLC)1038496157 |z (OCoLC)1036284887 |z (OCoLC)1057434127 |z (OCoLC)1087381435 |z (OCoLC)1097111470 |z (OCoLC)1100906477 |z (OCoLC)1162389082 |z (OCoLC)1300655633 | ||
245 | 0 | 0 | |a Information Security : |b foundations, technologies and applications / |c edited by Ali Ismail Awad and Michael Fairhurst. |
264 | 1 | |a London, United Kingdom : |b The Institution of Engineering and Technology, |c 2018. | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (xii, 404 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a IET Security Series ; |v 01 | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Introduction to information security foundations and applications / |r Ali Ismail Awad -- |t Information security foundation, theories and future vision / |r Steven Furnell -- |t Information systems security issues in the context of developing countries / |r Devinder Thapa, Samar Fumudoh, Usha Vishwanathan -- |t Biometric systems, modalities and attacks / |r Nathan Clarke -- |t Foundation of healthcare cybersecurity / |r Jemal H. Abawajy -- |t Security challenges and solutions for e-business / |r Anne James, Waleed Bulajoul, Yahaya Shehu, Yinsheng Li, Godwin Obande -- |t Recent security issues in Big Data: from past to the future of information systems / |r Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina -- |t Recent advances in unconstrained face recognition / |r Yunlian Sun, Massimo Tistarelli -- |t Hardware security: side-channel attacks and hardware Trojans / |r Eslam Yahya, Yehea Ismail -- |t Cybersecurity: timeline malware analysis and classification / |r Rafiqul Islam -- |t Recent trends in the cryptanalysis of block ciphers / |r Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef -- |t Images provenance inference through content-based device fingerprint analysis / |r Xufeng Lin, Chang-Tsun Li -- |t EEG-based biometrics for person identification and continuous authentication / |r Min Wang, Hussein A. Abbass, Jiankun Hu -- |t Data security and privacy in the Internet-of-Things / |r Delphine Reinhardt, Damien Sauveron -- |t Information security algorithm on embedded hardware / |r Raul Sanchez-Reillo. |
506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
520 | |a The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required. | ||
590 | |a Knovel |b Knovel (All titles) | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Security systems. | |
650 | 0 | |a Data protection. | |
655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
655 | 9 | |a electronic books |2 eczenas | |
700 | 1 | |a Awad, Ali Ismail, |e editor. | |
700 | 1 | |a Fairhurst, Michael C., |d 1948- |e editor. |1 https://id.oclc.org/worldcat/entity/E39PCjtC6j8kQr39xjHdmvGMbm | |
776 | 0 | 8 | |i Print version: |t Information security. |d London : The Institution of Engineering and Technology, 2018 |z 9781849199742 |w (OCoLC)1062298812 |
830 | 0 | |a IET security series ; |v 1. | |
856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpISFTA00A/information-security-foundations?kpromoter=marc |y Full text |