Information security and optimization / (Record no. 15778)

MARC details
000 -LEADER
fixed length control field 05228cam a2200625 i 4500
001 - CONTROL NUMBER
control field 9781003045854
003 - CONTROL NUMBER IDENTIFIER
control field FlBoTFG
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220724194258.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |||||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200628s2021 flu ob 001 0 eng
040 ## - CATALOGING SOURCE
Original cataloging agency OCoLC-P
Language of cataloging eng
Description conventions rda
Transcribing agency OCoLC-P
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781003045854
Qualifying information (ebook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1003045855
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367493455
Qualifying information (hardback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000220551
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000220559
Qualifying information (electronic bk. : EPUB)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000220537
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000220532
Qualifying information (electronic bk. : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9780367493479
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781000220544
Qualifying information (electronic bk. : Mobipocket)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1000220540
Qualifying information (electronic bk. : Mobipocket)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1176318714
Canceled/invalid control number (OCoLC)1224544787
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC-P)1176318714
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number I63 2021
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 012040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UB
Source bicssc
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 00 - TITLE STATEMENT
Title Information security and optimization /
Statement of responsibility, etc. edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer C&H\CRC Press,
Date of production, publication, distribution, manufacture, or copyright notice 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code nc
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma.
520 ## - SUMMARY, ETC.
Summary, etc. "Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"--
Assigning source Provided by publisher.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information technology
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mathematical optimization.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Computer Graphics / Game Programming & Design
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Cryptography
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Internet / Security
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Tanwar, Rohit,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Choudhury, Tanupriya,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zamani, Mazdak,
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Gupta, Sunil,
Dates associated with a name 1979-
Relator term editor.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Read Online
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781003045854">https://www.taylorfrancis.com/books/9781003045854</a>
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified OCLC metadata license agreement
Uniform Resource Identifier <a href="http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf">http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type eBook

No items available.

To Reach Us

0206993118
amiu.library@amref.ac.ke

Our Location

Lang’ata Road, opposite Wilson Airport
PO Box 27691 – 00506,   Nairobi, Kenya

Social Networks

Powered by Koha