Information Security and Optimization

Information Security and Optimization

Tanwar, Rohit; Zamani, Mazdak; Choudhury, Tanupriya; Gupta, Sunil

Taylor & Francis Ltd

10/2024

206

Mole

9780367493479

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
1. Information Security Policy and Standards

2. Vulnerability Management

3. Identity Theft and Prevention

4. Organization Security Policies and Their After Effects

5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?

6. Cryptography and Steganography Techniques

7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis

8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms

9. Analysis of Classification-Based Intrusion-Detection Techniques

10. Cryptocurrency and Blockchain

11. Cyber Security in Cloud Platforms

12. Biometrics-Unique Identity Verification System

13. Security Tools

14. Introduction to Optimization Algorithms-Bio Inspired

Appendix

Index
Information Security;FPGA;blockchain technology;IoT Security;cryptocurrency;Information Security Policy;Vulnerability Management;optimization algorithms;Biometric Systems;lightweight cryptography;Id;Vice Versa;CIO;System Crash;Sleuth Kit;Block Cipher;Cbc Mode;MANET Node;Image Morphing;Forgery Detection;Identity Theft;Internal Data Bus;Identity Theft Victimization;PSO;Xilinx ISE;Policy Life Cycle;Intrusion Detection;Behavioral Biometrics