The latest advances in computational methods have increased their scalability across a diverse range of applications and possible practical deployment. This book outlines the key emerging trends in computational methods, in terms of theories, algorithms and applications, for information security. Studies which couple computational theories and algorithms with real-time information security problems are combined with survey material which emphasizes the applications of computational methods in information security. It covers computing paradigms and technologies such as cryptography and cryptanalysis, biometrics-based identification and recognition, watermarking and steganography, software security assurance, physical and logical accesses, and cloud-based systems. It features applications to surveillance, e-health, e-government, e-business, financial services, computer forensics, privacy and trust, cybersecurity and defense.
Computational Methods in Information Security is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security and computing, and for professionals in sectors where information security is an issue.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Ali Ismail Awad is an Associate Professor in the Department of Computer Science, Electrical and Space Engineering, Lulea University of Technology, Sweden. He is also an Assistant Professor in the Electrical Engineering Department, Faculty of Engineering, Al Azhar University, Qena, Egypt. He is an IEEE Senior Member, and his research interests include information security, with a focus on biometrics, pattern recognition and computer networks.
Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent, UK. His research interests have a focus on the fundamental processes of image analysis and pattern recognition, with particular emphasis on applications in security and, especially, biometrics, and he is a Fellow of the IAPR. He is Editor-in-Chief of the IET Biometrics Journal and Series Editor of the IET Book Series on Advances in Biometrics.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781849199742_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Hardcover. Zustand: Brand New. 456 pages. 9.50x6.25x1.50 inches. In Stock. Artikel-Nr. x-1849199744
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Inhaltsverzeichnisrnrnn Part I: Theories and foundationsn Chapter 1: Introduction to information security foundations and applicationsn Chapter 2: Information security foundation, theories and future visionn Cha. Artikel-Nr. 905680998
Anzahl: Mehr als 20 verfügbar
Anbieter: preigu, Osnabrück, Deutschland
Buch. Zustand: Neu. Information Security: Foundations, Technologies and Applications | Ali Ismail Awad (u. a.) | Buch | Security | Gebunden | Englisch | 2018 | Institution of Engineering & Technology | EAN 9781849199742 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu. Artikel-Nr. 124033820
Anzahl: 5 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Neuware - This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Artikel-Nr. 9781849199742
Anzahl: 2 verfügbar