000 | 03643nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-319-48947-6 | ||
003 | DE-He213 | ||
005 | 20220801222502.0 | ||
007 | cr nn 008mamaa | ||
008 | 170102s2017 sz | s |||| 0|eng d | ||
020 |
_a9783319489476 _9978-3-319-48947-6 |
||
024 | 7 |
_a10.1007/978-3-319-48947-6 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJK _2bicssc |
|
072 | 7 |
_aTEC041000 _2bisacsh |
|
072 | 7 |
_aTJK _2thema |
|
082 | 0 | 4 |
_a621.382 _223 |
245 | 1 | 0 |
_aInformation Security Practices _h[electronic resource] : _bEmerging Threats and Perspectives / _cedited by Issa Traoré, Ahmed Awad, Isaac Woungang. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aVII, 104 p. 51 illus., 31 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aChapter 1.Introduction – Emerging Threats call for New Security Paradigms -- Chapter 2. Botnets Threat Analysis and Detection -- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics -- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis -- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication -- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection -- Chapter 8. Conclusion: Future Trends and Challenges. | |
520 | _aThis book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. . | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 0 |
_aBiometric identification. _911407 |
|
650 | 1 | 4 |
_aCommunications Engineering, Networks. _931570 |
650 | 2 | 4 |
_aComputer Communication Networks. _961736 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
650 | 2 | 4 |
_aBiometrics. _932763 |
700 | 1 |
_aTraoré, Issa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _961737 |
|
700 | 1 |
_aAwad, Ahmed. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _961738 |
|
700 | 1 |
_aWoungang, Isaac. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _929828 |
|
710 | 2 |
_aSpringerLink (Online service) _961739 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319489469 |
776 | 0 | 8 |
_iPrinted edition: _z9783319489483 |
776 | 0 | 8 |
_iPrinted edition: _z9783319840543 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-48947-6 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80818 _d80818 |