Information Technology

Security & Auditing

Per Page:
Sort:

Handbook of Image-based Security Techniques

1st Edition

Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
May 22, 2018

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking...

Flexible Network Architectures Security: Principles and Issues

1st Edition

Bhawana Rudra
April 23, 2018

The future of Internet security doesn’t lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for...

FinTech: The Technology Driving Disruption in the Financial Services Industry

1st Edition

Parag Y Arjunwadkar
April 12, 2018

Everything that we know about the world of finance is changing before us. Innovation is happening constantly, despite the protests of the traditional financial industry. With all the new technology that we have today, it is almost mind-blowing to think about the kind of technology that we will have...

Protocols for Secure Electronic Commerce

3rd Edition

Mostafa Hashem Sherif
March 29, 2018

Protocols for Secure Electronic Commerce, Third Edition presents a compendium of protocols for securing electronic commerce, or e-commerce, in consumer- and business-to-business applications. Attending to a variety of electronic payment systems currently in use around the globe, this edition:...

Circuits and Systems for Security and Privacy

1st Edition

Farhana Sheikh, Leonel Sousa
March 29, 2018

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of...

The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications: The Intelligent Cyber Shield for Smart Cities

1st Edition

Rocky Termanini
March 15, 2018

Present anti-virus technologies do not have the symmetrical weaponry to defeat massive DDoS attacks on smart cities. Smart cities require a new set of holistic and AI-centric cognitive technology, such as autonomic components that replicate the human immune system, and a smart grid that connects...

Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection

1st Edition

Mehdi Roopaei, Peyman Najafirad (Paul Rad)
March 15, 2018

This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection. In each chapter, it identifies advanced anomaly detection and key...

Measurable and Composable Security, Privacy, and Dependability for Cyberphysical Systems: The SHIELD Methodology

1st Edition

Andrea Fiaschetti, Josef Noll, Paolo Azzoni, Roberto Uribeetxeberria
January 04, 2018

With a business baseline focused on the impact of embedded systems in the years ahead, the book investigates the Security, Privacy and Dependability (SPD) requirements raised from existing and future IoT, Cyber-Physical and M2M systems. It proposes a new approach to embedded systems SPD, the SHIELD...

Enterprise Information Security Management

1st Edition

Meng-Chow Kang
December 31, 2017

The purpose of this course is to address the growing challenges of managing information security risks in enterprise and government organizations, prompted by the complexity and risks of today’s changing technological landscape, as well as increasingly demanding business aspirations. These...

Information Security Management Handbook, Fourth Edition: Volume IV

1st Edition

Harold Tipton
December 14, 2017

The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP. In response to new developments, Volume 4 supplements the previous volumes with new information covering topics such as wireless, HIPAA,...

Empirical Research for Software Security: Foundations and Experience

1st Edition

Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl
December 04, 2017

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that...

Big Data Analytics with Applications in Insider Threat Detection

1st Edition

Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
December 01, 2017

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to...

Conferences

Year: