Computational Methods In Information Security: Algorithms, Technologies And Applications by Ali Ismail AwadComputational Methods In Information Security: Algorithms, Technologies And Applications by Ali Ismail Awad

Computational Methods In Information Security: Algorithms, Technologies And Applications

byAli Ismail AwadEditorMichael Fairhurst, Neil Y. Yen

Hardcover | April 30, 2018

Pricing and Purchase Info

$221.85 online 
$255.50 list price
Earn 1,109 plum® points

Prices and offers may vary in store

Out of stock online

Not available in stores

about

The latest advances in computational methods have increased their scalability across a diverse range of applications and possible practical deployment. This book outlines the key emerging trends in computational methods, in terms of theories, algorithms and applications, for information security. Studies which couple computational theories and algorithms with real-time information security problems are combined with survey material which emphasizes the applications of computational methods in information security. It covers computing paradigms and technologies such as cryptography and cryptanalysis, biometrics-based identification and recognition, watermarking and steganography, software security assurance, physical and logical accesses, and cloud-based systems. It features applications to surveillance, e-health, e-government, e-business, financial services, computer forensics, privacy and trust, cybersecurity and defense.

Computational Methods in Information Securityis a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security and computing, and for professionals in sectors where information security is an issue.
Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent. He leads a research group with broad interests in the fundamental processes of image analysis and pattern recognition, with a particular focus on applications in security and especially biometrics.
Loading
Title:Computational Methods In Information Security: Algorithms, Technologies And ApplicationsFormat:HardcoverDimensions:456 pages, 9.41 × 7.24 × 0.98 inPublished:April 30, 2018Publisher:SciTech Publishers, IncorporatedLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1849199744

ISBN - 13:9781849199742

Look for similar items by category:

Reviews

Table of Contents

  • Chapter 1: Introduction to Information Security Foundations and Applications
  • Chapter 2: Information Security Foundation, Theories and Future Vision
  • Chapter 3: Information Systems Security Issues in the Context of Developing Countries
  • Chapter 4: Biometric Systems, Modalities & Attacks
  • Chapter 5: The foundation of healthcare Cybersecurity
  • Chapter 6: Security Challenges and Solutions for E-Business
  • Chapter 7: Recent Security Issues in Big Data: From Past to the Future of Information Systems
  • Chapter 8: Recent Advances in Unconstrained Face Recognition
  • Chapter 9: Hardware Security: Side-Channel Attacks and Hardware Trojans
  • Chapter 10: Cybersecurity: timeline malware analysis and classification
  • Chapter 11: Recent Trends in the Crytanalysis of Block Ciphers
  • Chapter 12: Image provenance inference through content-based device fingerprint analysis
  • Chapter 13: EEG-based Biometrics for Person Identification and Continuous Authentication
  • Chapter 14: Data Security and Privacy in the Internet-of-Things
  • Chapter 15: Information Security Algorithm on Embedded Hardware