๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information Security: Foundations, technologies and applications

โœ Scribed by Ali Ismail Awad; Michael Fairhurst


Publisher
Institution of Engineering & Technology
Year
2018
Tongue
English
Leaves
418
Series
IET Security Series 1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required


๐Ÿ“œ SIMILAR VOLUMES


Information Security: foundations, techn
โœ Awad, Ali Ismail; Fairhurst, Michael C ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› The Institution of Engineering and Technology ๐ŸŒ English

The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.</div> <br> Abstract: <div class="showMoreLessReadmore"> This book outlines key eme

Securing Information and Communications
โœ Steven M. Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte

Securing Information and Communications
โœ Steven M. Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte

Information Security Technologies for Co
โœ Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Babak Akhgar (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo