+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

PRINTER FRIENDLY

Information Security - Product Image

Information Security

  • ID: 4424903
  • Book
  • May 2018
  • IET Books
1 of 3

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

Note: Product cover images may vary from those shown
2 of 3
- Part I: Theories and foundations
- Chapter 1: Introduction to information security foundations and applications
- Chapter 2: Information security foundation, theories and future vision
- Chapter 3: Information systems security issues in the context of developing countries
- Chapter 4: Biometric systems, modalities and attacks
- Chapter 5: Foundation of healthcare cybersecurity
- Chapter 6: Security challenges and solutions for e-business
- Chapter 7: Recent security issues in Big Data: from past to the future of information systems
- Chapter 8: Recent advances in unconstrained face recognition

- Part II: Technologies and applications
- Chapter 9: Hardware security: side-channel attacks and hardware Trojans
- Chapter 10: Cybersecurity: timeline malware analysis and classification
- Chapter 11: Recent trends in the cryptanalysis of block ciphers
- Chapter 12: Image provenance inference through content-based device fingerprint analysis
- Chapter 13: EEG-based biometrics for person identification and continuous authentication
- Chapter 14: Data security and privacy in the Internet-of-Things
- Chapter 15: Information security algorithm on embedded hardware
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Ali Ismail Awad Associate Professor.
Lulea University of Technology, Department of Computer Science, Electrical and Space Engineering, Sweden.
Assistant Professor.
Al Azhar University, Electrical Engineering Department, Faculty of Engineering, Qena, Egypt.

Ali Ismail Awad is an Associate Professor in the Department of Computer Science, Electrical and Space Engineering, Lulea University of Technology, Sweden. He is also an Assistant Professor in the Electrical Engineering Department, Faculty of Engineering, Al Azhar University, Qena, Egypt. He is an IEEE Senior Member, and his research interests include information security, with a focus on biometrics, pattern recognition and computer networks.

Michael Fairhurst Professor.
University of Kent, School of Engineering and Digital Arts, UK.

Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent, UK. His research interests have a focus on the fundamental processes of image analysis and pattern recognition, with particular emphasis on applications in security and, especially, biometrics, and he is a Fellow of the IAPR. He is Editor-in-Chief of the IET Biometrics Journal and Series Editor of the IET Book Series on Advances in Biometrics.

Note: Product cover images may vary from those shown
Adroll
adroll