000 03643nam a22005895i 4500
001 978-3-319-48947-6
003 DE-He213
005 20220801222502.0
007 cr nn 008mamaa
008 170102s2017 sz | s |||| 0|eng d
020 _a9783319489476
_9978-3-319-48947-6
024 7 _a10.1007/978-3-319-48947-6
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
245 1 0 _aInformation Security Practices
_h[electronic resource] :
_bEmerging Threats and Perspectives /
_cedited by Issa Traoré, Ahmed Awad, Isaac Woungang.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aVII, 104 p. 51 illus., 31 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aChapter 1.Introduction – Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges.
520 _aThis book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .
650 0 _aTelecommunication.
_910437
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 0 _aBiometric identification.
_911407
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aComputer Communication Networks.
_961736
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aBiometrics.
_932763
700 1 _aTraoré, Issa.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_961737
700 1 _aAwad, Ahmed.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_961738
700 1 _aWoungang, Isaac.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_929828
710 2 _aSpringerLink (Online service)
_961739
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319489469
776 0 8 _iPrinted edition:
_z9783319489483
776 0 8 _iPrinted edition:
_z9783319840543
856 4 0 _uhttps://doi.org/10.1007/978-3-319-48947-6
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80818
_d80818