Information Security Practices (Record no. 80818)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03643nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-48947-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801222502.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 170102s2017 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319489476 |
-- | 978-3-319-48947-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.382 |
245 10 - TITLE STATEMENT | |
Title | Information Security Practices |
Sub Title | Emerging Threats and Perspectives / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | VII, 104 p. 51 illus., 31 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Chapter 1.Introduction – Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. . |
700 1# - AUTHOR 2 | |
Author 2 | Traoré, Issa. |
700 1# - AUTHOR 2 | |
Author 2 | Awad, Ahmed. |
700 1# - AUTHOR 2 | |
Author 2 | Woungang, Isaac. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-3-319-48947-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2017. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Biometric identification. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Communications Engineering, Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Biometrics. |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.