Digital Fingerprinting (Record no. 56220)

000 -LEADER
fixed length control field 03213nam a22005175i 4500
001 - CONTROL NUMBER
control field 978-1-4939-6601-1
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200421111853.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161025s2016 xxu| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781493966011
-- 978-1-4939-6601-1
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Digital Fingerprinting
300 ## - PHYSICAL DESCRIPTION
Number of Pages IX, 189 p. 46 illus.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Types and Origins of Fingerprints -- Device Measurement and Origin of Variation -- Crypto-based Methods and Fingerprints -- Fingerprinting by Design: Embedding and Authentication -- Digital Fingerprint: A Practical Hardware Security Primitive -- Operating System Fingerprinting -- Secure and Trustworthy Provenance Collection for Digital Forensics -- Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc This is the first book on digital fingerprinting that comprehensively covers the major areas of study in a range of information security areas including authentication schemes, intrusion detection, forensic analysis and more. Available techniques for assurance are limited and authentication schemes are potentially vulnerable to the theft of digital tokens or secrets. Intrusion detection can be thwarted by spoofing or impersonating devices, and forensic analysis is incapable of demonstrably tying a particular device to specific digital evidence. This book presents an innovative and effective approach that addresses these concerns. This book introduces the origins and scientific underpinnings of digital fingerprinting. It also proposes a unified framework for digital fingerprinting, evaluates methodologies and includes examples and case studies. The last chapter of this book covers the future directions of digital fingerprinting. This book is designed for practitioners and researchers working in the security field and military. Advanced-level students focused on computer science and engineering will find this book beneficial as secondary textbook or reference. .
700 1# - AUTHOR 2
Author 2 Wang, Cliff.
700 1# - AUTHOR 2
Author 2 Gerdes, Ryan M.
700 1# - AUTHOR 2
Author 2 Guan, Yong.
700 1# - AUTHOR 2
Author 2 Kasera, Sneha Kumar.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-4939-6601-1
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- New York, NY :
-- Springer New York :
-- Imprint: Springer,
-- 2016.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer science.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometrics (Biology).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Science.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Systems and Data Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Biometrics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Encryption.
912 ## -
-- ZDB-2-SCS

No items available.