Information security and optimization / (Record no. 71300)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05302cam a2200625 i 4500 |
001 - CONTROL NUMBER | |
control field | 9781003045854 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220711212439.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200628s2021 flu ob 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781003045854 |
-- | (ebook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1003045855 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
-- | (hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000220551 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000220559 |
-- | (electronic bk. : EPUB) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000220537 |
-- | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000220532 |
-- | (electronic bk. : PDF) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9781000220544 |
-- | (electronic bk. : Mobipocket) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 1000220540 |
-- | (electronic bk. : Mobipocket) |
082 00 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 00 - TITLE STATEMENT | |
Title | Information security and optimization / |
250 ## - EDITION STATEMENT | |
Edition statement | First edition. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | 1 online resource |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"-- |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Tanwar, Rohit, |
700 1# - AUTHOR 2 | |
Author 2 | Choudhury, Tanupriya, |
700 1# - AUTHOR 2 | |
Author 2 | Zamani, Mazdak, |
700 1# - AUTHOR 2 | |
Author 2 | Gupta, Sunil, |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://www.taylorfrancis.com/books/9781003045854 |
856 42 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Boca Raton : |
-- | C&H\CRC Press, |
-- | 2021. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | n |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | nc |
-- | rdacarrier |
520 ## - SUMMARY, ETC. | |
-- | Provided by publisher. |
588 ## - | |
-- | OCLC-licensed vendor bibliographic record. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information technology |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mathematical optimization. |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Computer Graphics / Game Programming & Design |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Cryptography |
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | COMPUTERS / Internet / Security |
No items available.