Information security and optimization:
"Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques a...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Boca Raton
CRC Press
2021
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | FHI01 UBM01 Volltext |
Zusammenfassung: | "Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"-- |
Beschreibung: | 1 Online-Ressource (xviii, 205 Seiten) Illustrationen, Diagramme |
ISBN: | 9781000220551 1000220559 9781000220537 1000220532 9781000220544 1000220540 9781003045854 1003045855 |
DOI: | 10.1201/9781003045854 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047207717 | ||
003 | DE-604 | ||
005 | 20220623 | ||
007 | cr|uuu---uuuuu | ||
008 | 210322s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781000220551 |9 9781000220551 | ||
020 | |a 1000220559 |9 1000220559 | ||
020 | |a 9781000220537 |9 9781000220537 | ||
020 | |a 1000220532 |9 1000220532 | ||
020 | |a 9781000220544 |9 9781000220544 | ||
020 | |a 1000220540 |9 1000220540 | ||
020 | |a 9781003045854 |9 9781003045854 | ||
020 | |a 1003045855 |9 1003045855 | ||
024 | 7 | |a 10.1201/9781003045854 |2 doi | |
035 | |a (OCoLC)1245335393 | ||
035 | |a (DE-599)BVBBV047207717 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-19 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
245 | 1 | 0 | |a Information security and optimization |c edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta |
250 | |a First edition | ||
264 | 1 | |a Boca Raton |b CRC Press |c 2021 | |
300 | |a 1 Online-Ressource (xviii, 205 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
505 | 8 | |a Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma | |
520 | 3 | |a "Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"-- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Information technology / Security measures | |
653 | 0 | |a Computer security | |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Mathematical optimization | |
653 | 0 | |a Computer security | |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Information technology / Security measures | |
653 | 0 | |a Mathematical optimization | |
653 | 6 | |a Electronic books | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Tanwar, Rohit |e Sonstige |4 oth | |
700 | 1 | |a Choudhury, Tanupriya |e Sonstige |4 oth | |
700 | 1 | |a Zamani, Mazdak |e Sonstige |4 oth | |
700 | 1 | |a Gupta, Sunil |d 1979- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780367493455 |
856 | 4 | 0 | |u https://doi.org/10.1201/9781003045854 |x Verlag |z URL des Erstveröffentlichers |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032612584 | ||
966 | e | |u https://doi.org/10.1201/9781003045854 |l FHI01 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1201/9781003045854 |l UBM01 |p ZDB-7-TFC |q UBM_PDA_TFC_Kauf_2022 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182319426174976 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
building | Verbundindex |
bvnumber | BV047207717 |
classification_rvk | ST 277 ST 276 |
collection | ZDB-7-TFC |
contents | Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma |
ctrlnum | (OCoLC)1245335393 (DE-599)BVBBV047207717 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1201/9781003045854 |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05366nmm a2200649 c 4500</leader><controlfield tag="001">BV047207717</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220623 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210322s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000220551</subfield><subfield code="9">9781000220551</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000220559</subfield><subfield code="9">1000220559</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000220537</subfield><subfield code="9">9781000220537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000220532</subfield><subfield code="9">1000220532</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000220544</subfield><subfield code="9">9781000220544</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000220540</subfield><subfield code="9">1000220540</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003045854</subfield><subfield code="9">9781003045854</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003045855</subfield><subfield code="9">1003045855</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003045854</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1245335393</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047207717</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Information security and optimization</subfield><subfield code="c">edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xviii, 205 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Mathematical optimization</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Information technology / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Mathematical optimization</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tanwar, Rohit</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Choudhury, Tanupriya</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zamani, Mazdak</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="d">1979-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780367493455</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1201/9781003045854</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032612584</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003045854</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1201/9781003045854</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">UBM_PDA_TFC_Kauf_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047207717 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:53:08Z |
indexdate | 2024-07-10T09:05:40Z |
institution | BVB |
isbn | 9781000220551 1000220559 9781000220537 1000220532 9781000220544 1000220540 9781003045854 1003045855 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032612584 |
oclc_num | 1245335393 |
open_access_boolean | |
owner | DE-573 DE-19 DE-BY-UBM |
owner_facet | DE-573 DE-19 DE-BY-UBM |
physical | 1 Online-Ressource (xviii, 205 Seiten) Illustrationen, Diagramme |
psigel | ZDB-7-TFC ZDB-7-TFC UBM_PDA_TFC_Kauf_2022 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Information security and optimization edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta First edition Boca Raton CRC Press 2021 1 Online-Ressource (xviii, 205 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma "Maintaining a practical perspective along with theoretical explanations, Information Security and Optimization explores the concepts that are essential for academics as well as organization's point of view. The book covers the definitions, discussion, working, and analysis of techniques and tools that are useful for a scholar ranging from beginners to experts. What are the policy standards, what are vulnerabilities, how to patch them, How to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, optimization algorithms, and etc. are some of the possible queries that have been described effectively using examples from real life and case studies. Features: A wide range of case studies and examples that are derived from real-life scenarios that map the theoretical explanations with real incidents. Description of security tools related to digital forensic with their unique features and the working steps for hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presents real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that needs focus because of extensive use of cloud services for serving organizational and research demands including data storage and computing requirements. The book Information Security and Optimization is equally helpful for the undergraduate and postgraduate students as for the researchers working in the domain. It can be recommended as a reference or textbook for the courses related to cybersecurity"-- Computersicherheit (DE-588)4274324-2 gnd rswk-swf Information technology / Security measures Computer security Data encryption (Computer science) Mathematical optimization Electronic books Computersicherheit (DE-588)4274324-2 s DE-604 Tanwar, Rohit Sonstige oth Choudhury, Tanupriya Sonstige oth Zamani, Mazdak Sonstige oth Gupta, Sunil 1979- Sonstige oth Erscheint auch als Druck-Ausgabe 9780367493455 https://doi.org/10.1201/9781003045854 Verlag URL des Erstveröffentlichers URL des Erstveröffentlichers Volltext |
spellingShingle | Information security and optimization Information security policy and standards / Samir Pawaskar -- Vulnerability management / K.N.D. Saile, Phani Kumar Gajula -- Identity theft and prevention / A. Tajpour, M. Zaman -- Organization security policies and their after effects / Premkumar Chithaluru, Ravi Prakash -- Cyber attacks and their impact on real life / Premkumar Chithaluru, Rohit Tanwar, Sunil Kumar -- Cryptography and steganography techniques / Ninni Singh, Gunjan Chhabra -- An FPGA-based advanced lightweight cryptography architecture for iot security and its cryptanalysis / Rajdeep Chakraborty, Jyotsna Kumar Mandal -- An overview of digital image forensics : image morphing & forgery detection algorithms / Rahul Chauhan, Preeti Mishra, R.C. Joshi -- Analysis of classification based intrusion detection techniques / S.Sridevi, R.Anandan -- Cryptocurrency and blockchain / Premkumar Chithaluru, Kulvinder Singh, Manish Kumar Sharma -- Cyber security in cloud platform / Shiv Dutta Mishra, Bhupesh Kumar Dewangan, Tanupriya Choudhury -- Biometrics-unique identity verification system / G. Chhabra, V. Sapra, N. Singh -- Security tools / Keshav Kaushik, Rohit Tanwar, A.K. Awasthi -- Introduction to optimization algorithms-bio inspired / Rakesh Kumar Saini, Shailee Choudhary, Anupam Singh, Amit Verma Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Information security and optimization |
title_auth | Information security and optimization |
title_exact_search | Information security and optimization |
title_exact_search_txtP | Information security and optimization |
title_full | Information security and optimization edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta |
title_fullStr | Information security and optimization edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta |
title_full_unstemmed | Information security and optimization edited by Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta |
title_short | Information security and optimization |
title_sort | information security and optimization |
topic | Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computersicherheit |
url | https://doi.org/10.1201/9781003045854 |
work_keys_str_mv | AT tanwarrohit informationsecurityandoptimization AT choudhurytanupriya informationsecurityandoptimization AT zamanimazdak informationsecurityandoptimization AT guptasunil informationsecurityandoptimization |