Skip to content
You are not logged in |Login  
     
Limit search to available items
Record 3 of 3
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title Information Security : foundations, technologies and applications / edited by Ali Ismail Awad and Michael Fairhurst.

Publication Info. London, United Kingdom : The Institution of Engineering and Technology, 2018.
©2018

Item Status

Description 1 online resource (xii, 404 pages) : illustrations.
text file
Series IET Security Series ; 01
IET security series ; 1.
Bibliography Includes bibliographical references and index.
Contents Intro; Contents; Part I: Theories and foundations; 1. Introduction to information security foundations and applications (Ali Ismail Awad); 2. Information security foundation, theories and future vision (Steven Furnell); 3. Information systems security issues in the context of developing countries (Devinder Thapa, Samar Fumudoh, and Usha Vishwanathan); 4. Biometric systems, modalities and attacks (Nathan Clarke); 5. Foundation of healthcare cybersecurity (Jemal H. Abawajy)
6. Security challenges and solutions for e-business (Anne James, Waleed Bulajoul, Yahaya Shehu, Yinsheng Li, and Godwin Obande)7. Recent security issues in Big Data: from past to the future of information systems (Julio Moreno, Manuel A. Serrano, and Eduardo Fernandez-Medina); 8. Recent advances in unconstrained face recognition (Yunlian Sun and Massimo Tistarelli); Part II: Technologies and applications; 9. Hardware security: side-channel attacks and hardware Trojans (Eslam Yahya and Yehea Ismail); 10. Cybersecurity: timeline malware analysis and classification (Rafiqul Islam)
11. Recent trends in the cryptanalysis of block ciphers (Ahmed Abdelkhalek, Mohamed Tolba, and Amr M. Youssef)12. Image provenance inference through content-based device fingerprint analysis (Xufeng Lin and Chang-Tsun Li); 13. EEG-based biometrics for person identification and continuous authentication (Min Wang, Hussein A. Abbass, and Jiankun Hu); 14. Data security and privacy in the Internet-of-Things (Delphine Reinhardt and Damien Sauveron); 15. Information security algorithm on embedded hardware (Raul Sanchez-Reillo); Index
Summary The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer security.
Computer security.
Security systems.
Security systems.
Data protection.
Data protection.
Genre/Form Electronic books.
Added Author Awad, Ali Ismail, editor.
Fairhurst, Michael C., 1948- editor.
Other Form: Print version: Awad, Ali Ismail. Information Security : Foundations, Technologies and Applications. Stevenage, Herfordshire : Institution of Engineering & Technology, ©2018 9781849199742
ISBN 9781849199766 (electronic book)
1849199760 (electronic book)
9781523116782 (electronic book)
1523116781 (electronic book)
9781849199742 (hardback)
1849199744 (hardback)