The latest advances in computational methods have increased their scalability across a diverse range of applications and possible practical deployment. This book outlines the key emerging trends in computational methods, in terms of theories, algorithms and applications, for information security. Studies which couple computational theories and algorithms with real-time information security problems are combined with survey material which emphasizes the applications of computational methods in information security. It covers computing paradigms and technologies such as cryptography and cryptanalysis, biometrics-based identification and recognition, watermarking and steganography, software security assurance, physical and logical accesses, and cloud-based systems. It features applications to surveillance, e-health, e-government, e-business, financial services, computer forensics, privacy and trust, cybersecurity and defense.
Computational Methods in Information Security is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security and computing, and for professionals in sectors where information security is an issue.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Ali Ismail Awad is an Associate Professor in the Department of Computer Science, Electrical and Space Engineering, Lulea University of Technology, Sweden. He is also an Assistant Professor in the Electrical Engineering Department, Faculty of Engineering, Al Azhar University, Qena, Egypt. He is an IEEE Senior Member, and his research interests include information security, with a focus on biometrics, pattern recognition and computer networks.
Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent, UK. His research interests have a focus on the fundamental processes of image analysis and pattern recognition, with particular emphasis on applications in security and, especially, biometrics, and he is a Fellow of the IAPR. He is Editor-in-Chief of the IET Biometrics Journal and Series Editor of the IET Book Series on Advances in Biometrics.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
Zustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers. Artikel-Nr. wbs4262424007
Anzahl: 1 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 456 pages. 9.50x6.25x1.50 inches. In Stock. Artikel-Nr. x-1849199744
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Inhaltsverzeichnisrnrnn Part I: Theories and foundationsn Chapter 1: Introduction to information security foundations and applicationsn Chapter 2: Information security foundation, theories and future visionn Cha. Artikel-Nr. 905680998
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Artikel-Nr. 9781849199742
Anzahl: 2 verfügbar