The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.
Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
Les mer
This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.
Les mer
Part I: Theories and foundationsChapter 1: Introduction to information security foundations and applicationsChapter 2: Information security foundation, theories and future visionChapter 3: Information systems security issues in the context of developing countriesChapter 4: Biometric systems, modalities and attacksChapter 5: Foundation of healthcare cybersecurityChapter 6: Security challenges and solutions for e-businessChapter 7: Recent security issues in Big Data: from past to the future of information systemsChapter 8: Recent advances in unconstrained face recognition
Part II: Technologies and applicationsChapter 9: Hardware security: side-channel attacks and hardware TrojansChapter 10: Cybersecurity: timeline malware analysis and classificationChapter 11: Recent trends in the cryptanalysis of block ciphersChapter 12: Image provenance inference through content-based device fingerprint analysisChapter 13: EEG-based biometrics for person identification and continuous authenticationChapter 14: Data security and privacy in the Internet-of-ThingsChapter 15: Information security algorithm on embedded hardware
Les mer
Produktdetaljer
ISBN
9781849199742
Publisert
2018-06-08
Utgiver
Vendor
Institution of Engineering and Technology
Høyde
234 mm
Bredde
156 mm
Aldersnivå
U, P, 05, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
416