The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in inform
Information Security: foundations, technologies and applications
โ Scribed by Awad, Ali Ismail; Fairhurst, Michael C
- Publisher
- The Institution of Engineering and Technology
- Year
- 2018
- Tongue
- English
- Leaves
- 417
- Series
- IET security series 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.
Abstract:
โฆ Table of Contents
Content: Intro
Contents
Part I: Theories and foundations
1. Introduction to information security foundations and applications (Ali Ismail Awad)
2. Information security foundation, theories and future vision (Steven Furnell)
3. Information systems security issues in the context of developing countries (Devinder Thapa, Samar Fumudoh, and Usha Vishwanathan)
4. Biometric systems, modalities and attacks (Nathan Clarke)
5. Foundation of healthcare cybersecurity (Jemal H. Abawajy) 6. Security challenges and solutions for e-business (Anne James, Waleed Bulajoul, Yahaya Shehu, Yinsheng Li, and Godwin Obande)7. Recent security issues in Big Data: from past to the future of information systems (Julio Moreno, Manuel A. Serrano, and Eduardo Fernandez-Medina)
8. Recent advances in unconstrained face recognition (Yunlian Sun and Massimo Tistarelli)
Part II: Technologies and applications
9. Hardware security: side-channel attacks and hardware Trojans (Eslam Yahya and Yehea Ismail)
10. Cybersecurity: timeline malware analysis and classification (Rafiqul Islam) 11. Recent trends in the cryptanalysis of block ciphers (Ahmed Abdelkhalek, Mohamed Tolba, and Amr M. Youssef)12. Image provenance inference through content-based device fingerprint analysis (Xufeng Lin and Chang-Tsun Li)
13. EEG-based biometrics for person identification and continuous authentication (Min Wang, Hussein A. Abbass, and Jiankun Hu)
14. Data security and privacy in the Internet-of-Things (Delphine Reinhardt and Damien Sauveron)
15. Information security algorithm on embedded hardware (Raul Sanchez-Reillo)
Index
โฆ Subjects
Computer security.;Security systems.;Data protection.;COMPUTERS -- Security -- General.;security of data.
๐ SIMILAR VOLUMES
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte
<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo