๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Information Security: foundations, technologies and applications

โœ Scribed by Awad, Ali Ismail; Fairhurst, Michael C


Publisher
The Institution of Engineering and Technology
Year
2018
Tongue
English
Leaves
417
Series
IET security series 1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.


Abstract:
This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded ย Read more...

โœฆ Table of Contents


Content: Intro
Contents
Part I: Theories and foundations
1. Introduction to information security foundations and applications (Ali Ismail Awad)
2. Information security foundation, theories and future vision (Steven Furnell)
3. Information systems security issues in the context of developing countries (Devinder Thapa, Samar Fumudoh, and Usha Vishwanathan)
4. Biometric systems, modalities and attacks (Nathan Clarke)
5. Foundation of healthcare cybersecurity (Jemal H. Abawajy) 6. Security challenges and solutions for e-business (Anne James, Waleed Bulajoul, Yahaya Shehu, Yinsheng Li, and Godwin Obande)7. Recent security issues in Big Data: from past to the future of information systems (Julio Moreno, Manuel A. Serrano, and Eduardo Fernandez-Medina)
8. Recent advances in unconstrained face recognition (Yunlian Sun and Massimo Tistarelli)
Part II: Technologies and applications
9. Hardware security: side-channel attacks and hardware Trojans (Eslam Yahya and Yehea Ismail)
10. Cybersecurity: timeline malware analysis and classification (Rafiqul Islam) 11. Recent trends in the cryptanalysis of block ciphers (Ahmed Abdelkhalek, Mohamed Tolba, and Amr M. Youssef)12. Image provenance inference through content-based device fingerprint analysis (Xufeng Lin and Chang-Tsun Li)
13. EEG-based biometrics for person identification and continuous authentication (Min Wang, Hussein A. Abbass, and Jiankun Hu)
14. Data security and privacy in the Internet-of-Things (Delphine Reinhardt and Damien Sauveron)
15. Information security algorithm on embedded hardware (Raul Sanchez-Reillo)
Index

โœฆ Subjects


Computer security.;Security systems.;Data protection.;COMPUTERS -- Security -- General.;security of data.


๐Ÿ“œ SIMILAR VOLUMES


Information Security: Foundations, techn
โœ Ali Ismail Awad; Michael Fairhurst ๐Ÿ“‚ Library ๐Ÿ“… 2018 ๐Ÿ› Institution of Engineering & Technology ๐ŸŒ English

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in inform

Securing Information and Communications
โœ Steven M. Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte

Securing Information and Communications
โœ Steven M. Furnell, Sokratis Katsikas, Javier Lopez, Ahmed Patel ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐ŸŒ English

Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte

Information Security Technologies for Co
โœ Hamid Jahankhani (editor), Stefan Kendzierskyj (editor), Babak Akhgar (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2021 ๐Ÿ› Springer ๐ŸŒ English

<p><span>The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lo