Information Security Practices Emerging Threats and Perspectives /

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigm...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Traoré, Issa (Επιμελητής έκδοσης), Awad, Ahmed (Επιμελητής έκδοσης), Woungang, Isaac (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03209nam a22005295i 4500
001 978-3-319-48947-6
003 DE-He213
005 20170102105354.0
007 cr nn 008mamaa
008 170102s2017 gw | s |||| 0|eng d
020 |a 9783319489476  |9 978-3-319-48947-6 
024 7 |a 10.1007/978-3-319-48947-6  |2 doi 
040 |d GrThAP 
050 4 |a TK1-9971 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
245 1 0 |a Information Security Practices  |h [electronic resource] :  |b Emerging Threats and Perspectives /  |c edited by Issa Traoré, Ahmed Awad, Isaac Woungang. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a VII, 104 p. 51 illus., 31 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1.Introduction – Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges. 
520 |a This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. . 
650 0 |a Engineering. 
650 0 |a Computer security. 
650 0 |a Computers. 
650 0 |a Biometrics (Biology). 
650 0 |a System safety. 
650 0 |a Electrical engineering. 
650 1 4 |a Engineering. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Information Systems and Communication Service. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Security Science and Technology. 
650 2 4 |a Biometrics. 
700 1 |a Traoré, Issa.  |e editor. 
700 1 |a Awad, Ahmed.  |e editor. 
700 1 |a Woungang, Isaac.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783319489469 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-48947-6  |z Full Text via HEAL-Link 
912 |a ZDB-2-ENG 
950 |a Engineering (Springer-11647)