|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
KNOVEL_on1038496157 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
180602t20182018enka ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d CDN
|d UIU
|d MERUC
|d OCLCF
|d OTZ
|d STF
|d N$T
|d OCLCQ
|d IN0
|d XPJ
|d LVT
|d U3G
|d YDX
|d CUS
|d KNOVL
|d OCLCQ
|d K6U
|d UKAHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1036284887
|a 1057434127
|a 1087381435
|a 1097111470
|a 1100906477
|a 1162389082
|a 1300655633
|
020 |
|
|
|a 9781849199766
|q (electronic bk.)
|
020 |
|
|
|a 1849199760
|q (electronic bk.)
|
020 |
|
|
|a 9781523116782
|q (electronic bk.)
|
020 |
|
|
|a 1523116781
|q (electronic bk.)
|
020 |
|
|
|z 9781849199742
|q (hardback)
|
020 |
|
|
|z 1849199744
|q (hardback)
|
035 |
|
|
|a (OCoLC)1038496157
|z (OCoLC)1036284887
|z (OCoLC)1057434127
|z (OCoLC)1087381435
|z (OCoLC)1097111470
|z (OCoLC)1100906477
|z (OCoLC)1162389082
|z (OCoLC)1300655633
|
050 |
|
4 |
|a QA76.9.A25
|b I56 2018eb
|
072 |
|
7 |
|a C0000
|2 inspec
|
072 |
|
7 |
|a C6130S
|2 inspec
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Information Security :
|b foundations, technologies and applications /
|c edited by Ali Ismail Awad and Michael Fairhurst.
|
264 |
|
1 |
|a London, United Kingdom :
|b The Institution of Engineering and Technology,
|c 2018.
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (xii, 404 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a IET Security Series ;
|v 01
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed October 24, 2018).
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Introduction to information security foundations and applications /
|r Ali Ismail Awad --
|t Information security foundation, theories and future vision /
|r Steven Furnell --
|t Information systems security issues in the context of developing countries /
|r Devinder Thapa, Samar Fumudoh, Usha Vishwanathan --
|t Biometric systems, modalities and attacks /
|r Nathan Clarke --
|t Foundation of healthcare cybersecurity /
|r Jemal H. Abawajy --
|t Security challenges and solutions for e-business /
|r Anne James, Waleed Bulajoul, Yahaya Shehu, Yinsheng Li, Godwin Obande --
|t Recent security issues in Big Data: from past to the future of information systems /
|r Julio Moreno, Manuel A. Serrano, Eduardo Fernández-Medina --
|t Recent advances in unconstrained face recognition /
|r Yunlian Sun, Massimo Tistarelli --
|t Hardware security: side-channel attacks and hardware Trojans /
|r Eslam Yahya, Yehea Ismail --
|t Cybersecurity: timeline malware analysis and classification /
|r Rafiqul Islam --
|t Recent trends in the cryptanalysis of block ciphers /
|r Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef --
|t Images provenance inference through content-based device fingerprint analysis /
|r Xufeng Lin, Chang-Tsun Li --
|t EEG-based biometrics for person identification and continuous authentication /
|r Min Wang, Hussein A. Abbass, Jiankun Hu --
|t Data security and privacy in the Internet-of-Things /
|r Delphine Reinhardt, Damien Sauveron --
|t Information security algorithm on embedded hardware /
|r Raul Sanchez-Reillo.
|
520 |
|
|
|a The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
650 |
|
7 |
|a security of data.
|2 inspect
|
700 |
1 |
|
|a Awad, Ali Ismail,
|e editor.
|
700 |
1 |
|
|a Fairhurst, Michael C.,
|d 1948-
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Information security.
|d London : The Institution of Engineering and Technology, 2018
|z 9781849199742
|w (OCoLC)1062298812
|
830 |
|
0 |
|a IET security series ;
|v 1.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpISFTA00A/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33665991
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5400685
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1805102
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15374794
|
994 |
|
|
|a 92
|b IZTAP
|