9781849199742
Information Security: Foundations,Technologies and Applications
ISBN-10: 1849199744
ISBN-13: 9781849199742
Publication Date 出版日期: 2018-06-08
Print Length 页数: 416
Description
The rapid advancements in telecommunications,computing hardware and software,and data encryption,and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored,processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics,cybersecurity,and big data security to applications in hardware and embedded systems security,computer forensics,the Internet of Things security,and network security.
Information Security: Foundations,technologies and applications is a comprehensive review of cutting-edge algorithms,technologies,and applications,and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security,and for professionals in sectors where information security is required.
About the Editors
Ali Ismail Awad is an Associate Professor in the Department of Computer Science,Electrical and Space Engineering,Lulea University of Technology,Sweden. He is also an Assistant Professor in the Electrical Engineering Department,Faculty of Engineering,Al Azhar University,Qena,Egypt. He is an IEEE Senior Member,and his research interests include information security,with a focus on biometrics,pattern recognition and computer networks.
Michael Fairhurst is Professor of Computer Vision in the School of Engineering and Digital Arts at the University of Kent,UK. His research interests have a focus on the fundamental processes of image analysis and pattern recognition,with particular emphasis on applications in security and,especially,biometrics,and he is a Fellow of the IAPR. He is Editor-in-Chief of the IET Biometrics Journal and Series Editor of the IET Book Series on Advances in Biometrics.
Book readership
This book is ideal for researchers,scientists,engineers and academics in information security,communications and computing. Also suitable for professionals working in sectors where information security is an issue.
Book contents
This information is provisional and will be updated prior to publication
Chapter 1: Introduction to Information Security Foundations and Applications- Ali Ismail Awad
Chapter 2: Information Security Foundation,Theories and Future Vision- Steven Furnell
Chapter 3: Information Systems Security Issues in the Context of Developing Countries- Devinder Thapa,Samar Fumudoh,Usha Vishwanathan
Chapter 4: Biometric Systems,Modalities & Attacks- Nathan Clarke
Chapter 5: The foundation of healthcare Cybersecurity- Jemal H. Abawajy
Chapter 6: Security Challenges and Solutions for E-Business- Anne James,Waleed Bulajoul,Yahaya Shehu,Yinsheng Li,Godwin Obande
Chapter 7: Recent Security Issues in Big Data: From Past to the Future of Information Systems- Julio Moreno,Manuel A. Serrano,Eduardo Fernandez-Medina
Chapter 8: Recent Advances in Unconstrained Face Recognition- Yunlian Sun,Massimo Tistarelli
Chapter 9: Hardware Security: Side-Channel Attacks and Hardware Trojans- Eslam Yahya,Yehea Ismail
Chapter 10: Cybersecurity: timeline malware analysis and classification- Rafiqul Islam,Mohammed M Chowdhury
Chapter 11: Recent Trends in the Crytanalysis of Block Ciphers- Ahmed Abdelkhalek,Mohamed Tolba,Amr M. Youssef
Chapter 12: Image provenance inference through content-based device fingerprint analysis- Xufeng Lin,Chang-Tsun Li
Chapter 13: EEG-based Biometrics for Person Identification and Continuous Authentication- Min Wang,Hussein A. Abbass,Jiankun Hu
Chapter 14: Data Security and Privacy in the Internet-of-Things- Delphine Reinhardt,Damien Sauveron
Chapter 15: Information Security Algorithm on Embedded Hardware- Raul Sanchez-Reillo