Information Security
Institution of Engineering and Technology (Verlag)
978-1-84919-974-2 (ISBN)
Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
Ali Ismail Awad is an Associate Professor in the Department of Computer Science, Electrical and Space Engineering, Lulea University of Technology, Sweden. He is also an Assistant Professor in the Electrical Engineering Department, Faculty of Engineering, Al Azhar University, Qena, Egypt. He is an IEEE Senior Member, and his research interests include information security, with a focus on biometrics, pattern recognition and computer networks. Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent, UK. His research interests have a focus on the fundamental processes of image analysis and pattern recognition, with particular emphasis on applications in security and, especially, biometrics, and he is a Fellow of the IAPR. He is Editor-in-Chief of the IET Biometrics Journal and Series Editor of the IET Book Series on Advances in Biometrics.
Part I: Theories and foundations
Chapter 1: Introduction to information security foundations and applications
Chapter 2: Information security foundation, theories and future vision
Chapter 3: Information systems security issues in the context of developing countries
Chapter 4: Biometric systems, modalities and attacks
Chapter 5: Foundation of healthcare cybersecurity
Chapter 6: Security challenges and solutions for e-business
Chapter 7: Recent security issues in Big Data: from past to the future of information systems
Chapter 8: Recent advances in unconstrained face recognition
Part II: Technologies and applications
Chapter 9: Hardware security: side-channel attacks and hardware Trojans
Chapter 10: Cybersecurity: timeline malware analysis and classification
Chapter 11: Recent trends in the cryptanalysis of block ciphers
Chapter 12: Image provenance inference through content-based device fingerprint analysis
Chapter 13: EEG-based biometrics for person identification and continuous authentication
Chapter 14: Data security and privacy in the Internet-of-Things
Chapter 15: Information security algorithm on embedded hardware
Erscheinungsdatum | 12.08.2018 |
---|---|
Reihe/Serie | Security |
Verlagsort | Stevenage |
Sprache | englisch |
Maße | 156 x 234 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 1-84919-974-4 / 1849199744 |
ISBN-13 | 978-1-84919-974-2 / 9781849199742 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich