000 05228cam a2200625 i 4500
001 9781003045854
003 FlBoTFG
005 20220724194258.0
006 m o d
007 cr |||||||||||
008 200628s2021 flu ob 001 0 eng
040 _aOCoLC-P
_beng
_erda
_cOCoLC-P
020 _a9781003045854
_q(ebook)
020 _a1003045855
020 _z9780367493455
_q(hardback)
020 _a9781000220551
_q(electronic bk. : EPUB)
020 _a1000220559
_q(electronic bk. : EPUB)
020 _a9781000220537
_q(electronic bk. : PDF)
020 _a1000220532
_q(electronic bk. : PDF)
020 _z9780367493479
020 _a9781000220544
_q(electronic bk. : Mobipocket)
020 _a1000220540
_q(electronic bk. : Mobipocket)
035 _a(OCoLC)1176318714
_z(OCoLC)1224544787
035 _a(OCoLC-P)1176318714
050 0 0 _aQA76.9.A25
_bI63 2021
072 7 _aCOM
_x012040
_2bisacsh
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aUB
_2bicssc
082 0 0 _a005.8
_223
245 0 0 _aInformation security and optimization /
_cedited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta.
250 _aFirst edition.
264 1 _aBoca Raton :
_bC&H\CRC Press,
_c2021.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bn
_2rdamedia
338 _aonline resource
_bnc
_2rdacarrier
505 0 _aInformation security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma.
520 _a"Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"--
_cProvided by publisher.
588 _aOCLC-licensed vendor bibliographic record.
650 0 _aInformation technology
_xSecurity measures.
650 0 _aComputer security.
650 0 _aData encryption (Computer science)
650 0 _aMathematical optimization.
650 7 _aCOMPUTERS / Computer Graphics / Game Programming & Design
_2bisacsh
650 7 _aCOMPUTERS / Cryptography
_2bisacsh
650 7 _aCOMPUTERS / Internet / Security
_2bisacsh
700 1 _aTanwar, Rohit,
_eeditor.
700 1 _aChoudhury, Tanupriya,
_eeditor.
700 1 _aZamani, Mazdak,
_eeditor.
700 1 _aGupta, Sunil,
_d1979-
_eeditor.
856 4 0 _3Read Online
_uhttps://www.taylorfrancis.com/books/9781003045854
856 4 2 _3OCLC metadata license agreement
_uhttp://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 _2lcc
_cEBK
999 _c15778
_d15778