Information Security Practices (eBook)

Emerging Threats and Perspectives
eBook Download: PDF
2017 | 1st ed. 2017
VII, 104 Seiten
Springer International Publishing (Verlag)
978-3-319-48947-6 (ISBN)

Lese- und Medienproben

Information Security Practices -
Systemvoraussetzungen
117,69 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.  



Professor Issa Traore has a Ph.D. in Software Engineering from Institute Nationale Polytechnique - Toulouse, France. Dr. Traore is the Co-Founder and Chief Scientist of Plurilock Security Solutions Inc. Plurilock delivers biometrics security and online fraud detection solutions to the global market. Dr. Traore is also a full Professor at the University of Victoria, Department of Electrical and Computer Engineering since 1999. He is the founder and Coordinator of the Information Security and Object Technology (ISOT) Laboratory. He is the co-author of the first book on continuous authentication using biometric technologies and the first book on gait biometrics based on the ground reaction force (GRF). He has been granted two US patents on behavioral biometrics and emerging authentication technologies. He has published over 130 papers in archival journals and conferences on network security and biometrics technologies.

Dr. Ahmed Awad is an Associate Professor in the Department of Computer Science, NYIT Vancouver Campus. His main research interest is focused on Security Engineering, Human Computer Interaction, and Biometrics. Dr. Awad worked as a Software Design Engineer, Architect, Project Manager, and Security Consultant at a number of leading software firms and enterprises. He is the co-founder of Plurilock Security Solutions Inc. Dr. Awad  received Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008.

Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada,. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). Since January 2012, he is serving as Chair of Computer Chapter, IEEE Toronto Section.

Professor Issa Traore has a Ph.D. in Software Engineering from Institute Nationale Polytechnique - Toulouse, France. Dr. Traore is the Co-Founder and Chief Scientist of Plurilock Security Solutions Inc. Plurilock delivers biometrics security and online fraud detection solutions to the global market. Dr. Traore is also a full Professor at the University of Victoria, Department of Electrical and Computer Engineering since 1999. He is the founder and Coordinator of the Information Security and Object Technology (ISOT) Laboratory. He is the co-author of the first book on continuous authentication using biometric technologies and the first book on gait biometrics based on the ground reaction force (GRF). He has been granted two US patents on behavioral biometrics and emerging authentication technologies. He has published over 130 papers in archival journals and conferences on network security and biometrics technologies.Dr. Ahmed Awad is an Associate Professor in the Department of Computer Science, NYIT Vancouver Campus. His main research interest is focused on Security Engineering, Human Computer Interaction, and Biometrics. Dr. Awad worked as a Software Design Engineer, Architect, Project Manager, and Security Consultant at a number of leading software firms and enterprises. He is the co-founder of Plurilock Security Solutions Inc. Dr. Awad  received Ph.D. in Electrical and Computer Engineering from the University of Victoria, Victoria, BC, Canada in 2008.Professor Isaac Woungang received his Ph.D. degree in Mathematics from the University of South, Toulon and Var, France. From 1999 to 2002, he worked as a software engineer in the Photonic Line Systems Group, Nortel Networks, Ottawa, Ontario, Canada,. Since 2002, he has been with Ryerson University, where he is now a full professor of Computer Science and Director of the Distributed Applications and Broad band (DABNEL) Lab. Dr. Woungang has published 8 books and over 89 refereed technical articles in scholarly international journals and proceedings of international conferences. He has served as Associate Editor of the Computers and Electrical Engineering (Elsevier), and the International Journal of Communication Systems (Wiley). He has Guest Edited several Special Issues with various reputed journals such as IET Information Security, Mathematical and Computer Modeling (Elsevier), Computer Communications (Elsevier), Computers and Electrical Engineering (Elsevier), and Telecommunication Systems (Springer). Since January 2012, he is serving as Chair of Computer Chapter, IEEE Toronto Section.

Chapter 1.Introduction – Emerging Threats call for New Security Paradigms.- Chapter 2. Botnets Threat Analysis and Detection.- Chapter 3. Collective Framework for Fraud Detection using Behavioral Biometrics.- Chapter 4. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 5. The Hardware Trojan System: An On-line Suite of Tools for Hardware Trojan Analysis.- Chapter 6. Ensuring Online Exam Integrity through Continuous Biometric Authentication.- Chapter 7.An Enhanced CUSUM Algorithm for Anomaly Detection.- Chapter 8. Conclusion: Future Trends and Challenges.

Erscheint lt. Verlag 2.1.2017
Zusatzinfo VII, 104 p. 51 illus., 31 illus. in color.
Verlagsort Cham
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Technik Bauwesen
Technik Elektrotechnik / Energietechnik
Schlagworte biometrics • cyber security • information assurance • Information Authentication • Information Authorization • Information Privacy • Information protection • Intrusion Protection
ISBN-10 3-319-48947-X / 331948947X
ISBN-13 978-3-319-48947-6 / 9783319489476
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90