Advances in computers. Volume 83 /
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal ar...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
London ; Waltham, MA :
Academic Press,
2011.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Computers; Copyright; Contents; Preface; Chapter 1: The State of the Art in Identity Theft; 1. Introduction; 2. What Sets Identity Theft Apart from Other Crimes; 3. Statistical Data for Identity Theft and Associated Crimes; 4. The Genesis of the Problem; 5. How SSN Became the De Facto Primary Key for Most Databases; 6. The Ubiquitous Use of Fungible Credentials; 7. Phishing; 8. Modus Operandi; 9. Inadequate Credential Management Procedures; 10. Strategies for Defeating Identity Thieves; 11. Conclusion; References; Chapter 2: An Overview of Steganography; 1. Introduction
- 2. Low-Tech Stego Methods3. Digital Technology Basics; 4. Steganography and Digital Carrier Files; 5. Detecting Steganography; 6. Steganography Detection Tools; 7. Summary and Conclusions; Appendix A. Additional Web Sites; Appendix B. Companion Downloads to this Chapter; References; Chapter 3: Captchas: An Artificial Intelligence Application to Web Security; 1. Introduction; 2. Motivation and Applications; 3. Types of CAPTCHAs; 4. Evaluation of CAPTCHAs; 5. Security and Attacks on CAPTCHAs; 6. Alternatives to CAPTCHAs; 7. Conclusions and Future Trends; References
- Chapter 4: Advances in Video-Based Biometrics1. Introduction; 2. Video-Based Face Recognition; 3. Video-Based Identification Using Gait; 4. Conclusions; Acknowledments; References; Chapter 5: Action Research Can Swing the Balance in Experimental Software Engineering; 1. Introduction; 2. Action Research Overview; 3. The Use of Action Research in Software Engineering: A Preliminary Survey?; 4. Using Action Research in Software Engineering: An In Vivo Study; 5. Applying Action Research to Software Engineering; 6. Final Considerations; Acknowledments; References
- Chapter 6: Functional and Nonfunctional Design Verification for Embedded Software Systems1. Introduction; 2. Background; 3. Instrumentation-based Verification; 4. Quality Attribute-Based Reasoning; 5. Integrated Functional and Nonfunctional Verification; 6. Tool Support; 7. Conclusion; References; Author Index; Subject Index; Contents of Volumes in This Series