Applications of encryption and watermarking for information security:
This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the domain of security and privacy. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information security,...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey PA, USA
IGI Global
[2023]
|
Schriftenreihe: | Advances in information security, privacy, and ethics (AISPE) book series
|
Schlagworte: | |
Online-Zugang: | DE-898 DE-83 DE-91 DE-706 DE-1050 Volltext |
Zusammenfassung: | This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the domain of security and privacy. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information security, that is, trust at the level of cryptography and watermarking, finally, trust at the level of securing multimedia data. |
Beschreibung: | 1 Online-Ressource (xvii, 245 Seiten) Illustrationen, Diagramme |
ISBN: | 9781668449479 |
DOI: | 10.4018/978-1-6684-4945-5 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV048933685 | ||
003 | DE-604 | ||
005 | 20241212 | ||
007 | cr|uuu---uuuuu | ||
008 | 230509s2023 xx a||| o|||| 00||| eng d | ||
020 | |a 9781668449479 |9 978-1-6684-4947-9 | ||
024 | 7 | |a 10.4018/978-1-6684-4945-5 |2 doi | |
035 | |a (ZDB-98-IGB)00293044 | ||
035 | |a (OCoLC)1379405709 | ||
035 | |a (DE-599)BVBBV048933685 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-83 |a DE-898 |a DE-706 |a DE-1050 | ||
082 | 0 | |a 005.8/24 | |
084 | |a WIR 523 |2 stub | ||
084 | |a DAT 000 |2 stub | ||
245 | 1 | 0 | |a Applications of encryption and watermarking for information security |c Boussif Mohamed |
264 | 1 | |a Hershey PA, USA |b IGI Global |c [2023] | |
264 | 4 | |c © 2023 | |
300 | |a 1 Online-Ressource (xvii, 245 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Advances in information security, privacy, and ethics (AISPE) book series | |
520 | |a This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the domain of security and privacy. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information security, that is, trust at the level of cryptography and watermarking, finally, trust at the level of securing multimedia data. | ||
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Digital watermarking | |
650 | 4 | |a Electronic information resources |x Access control | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
700 | 1 | |a Mohamed, Boussif |d 1989- |0 (DE-588)1293672610 |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-1-6684-4945-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-6684-4946-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-6684-4945-5 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-6684-4945-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034197583 | |
966 | e | |u https://doi.org/10.4018/978-1-6684-4945-5 |l DE-898 |p ZDB-98-IGB |q FHR_PDA_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-4945-5 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-4945-5 |l DE-91 |p ZDB-98-IGB |q TUM_Paketkauf_2023 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-4945-5 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-6684-4945-5 |l DE-1050 |p ZDB-98-IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818715323373715456 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Mohamed, Boussif 1989- |
author2_role | edt |
author2_variant | b m bm |
author_GND | (DE-588)1293672610 |
author_facet | Mohamed, Boussif 1989- |
building | Verbundindex |
bvnumber | BV048933685 |
classification_tum | WIR 523 DAT 000 |
collection | ZDB-98-IGB |
ctrlnum | (ZDB-98-IGB)00293044 (OCoLC)1379405709 (DE-599)BVBBV048933685 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
discipline_str_mv | Informatik Wirtschaftswissenschaften |
doi_str_mv | 10.4018/978-1-6684-4945-5 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV048933685</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20241212</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230509s2023 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781668449479</subfield><subfield code="9">978-1-6684-4947-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-6684-4945-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-98-IGB)00293044</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1379405709</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048933685</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">WIR 523</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applications of encryption and watermarking for information security</subfield><subfield code="c">Boussif Mohamed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey PA, USA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xvii, 245 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Advances in information security, privacy, and ethics (AISPE) book series</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the domain of security and privacy. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information security, that is, trust at the level of cryptography and watermarking, finally, trust at the level of securing multimedia data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic information resources</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mohamed, Boussif</subfield><subfield code="d">1989-</subfield><subfield code="0">(DE-588)1293672610</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-1-6684-4945-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-6684-4946-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-6684-4945-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034197583</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHR_PDA_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUM_Paketkauf_2023</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-6684-4945-5</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV048933685 |
illustrated | Illustrated |
index_date | 2024-07-03T21:57:49Z |
indexdate | 2024-12-17T19:01:32Z |
institution | BVB |
isbn | 9781668449479 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034197583 |
oclc_num | 1379405709 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-83 DE-898 DE-BY-UBR DE-706 DE-1050 |
owner_facet | DE-91 DE-BY-TUM DE-83 DE-898 DE-BY-UBR DE-706 DE-1050 |
physical | 1 Online-Ressource (xvii, 245 Seiten) Illustrationen, Diagramme |
psigel | ZDB-98-IGB ZDB-98-IGB FHR_PDA_IGB ZDB-98-IGB TUB_EBS_IGB ZDB-98-IGB TUM_Paketkauf_2023 |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | IGI Global |
record_format | marc |
series2 | Advances in information security, privacy, and ethics (AISPE) book series |
spelling | Applications of encryption and watermarking for information security Boussif Mohamed Hershey PA, USA IGI Global [2023] © 2023 1 Online-Ressource (xvii, 245 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Advances in information security, privacy, and ethics (AISPE) book series This book will aim to provide relevant theoretical frameworks and the latest empirical research findings in the domain of security and privacy. It will be written for professionals who want to improve their understanding of the strategic role of trust at different levels of the information security, that is, trust at the level of cryptography and watermarking, finally, trust at the level of securing multimedia data. Data encryption (Computer science) Digital watermarking Electronic information resources Access control (DE-588)4143413-4 Aufsatzsammlung gnd-content Mohamed, Boussif 1989- (DE-588)1293672610 edt Erscheint auch als Druck-Ausgabe, Hardcover 978-1-6684-4945-5 Erscheint auch als Druck-Ausgabe, Paperback 978-1-6684-4946-2 Erscheint auch als Druck-Ausgabe 1-6684-4945-5 https://doi.org/10.4018/978-1-6684-4945-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Applications of encryption and watermarking for information security Data encryption (Computer science) Digital watermarking Electronic information resources Access control |
subject_GND | (DE-588)4143413-4 |
title | Applications of encryption and watermarking for information security |
title_auth | Applications of encryption and watermarking for information security |
title_exact_search | Applications of encryption and watermarking for information security |
title_exact_search_txtP | Applications of encryption and watermarking for information security |
title_full | Applications of encryption and watermarking for information security Boussif Mohamed |
title_fullStr | Applications of encryption and watermarking for information security Boussif Mohamed |
title_full_unstemmed | Applications of encryption and watermarking for information security Boussif Mohamed |
title_short | Applications of encryption and watermarking for information security |
title_sort | applications of encryption and watermarking for information security |
topic | Data encryption (Computer science) Digital watermarking Electronic information resources Access control |
topic_facet | Data encryption (Computer science) Digital watermarking Electronic information resources Access control Aufsatzsammlung |
url | https://doi.org/10.4018/978-1-6684-4945-5 |
work_keys_str_mv | AT mohamedboussif applicationsofencryptionandwatermarkingforinformationsecurity |