Information Security and Optimization
portes grátis
Information Security and Optimization
Tanwar, Rohit; Zamani, Mazdak; Choudhury, Tanupriya; Gupta, Sunil
Taylor & Francis Ltd
10/2024
206
Mole
9780367493479
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
1. Information Security Policy and Standards
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Information Security;FPGA;blockchain technology;IoT Security;cryptocurrency;Information Security Policy;Vulnerability Management;optimization algorithms;Biometric Systems;lightweight cryptography;Id;Vice Versa;CIO;System Crash;Sleuth Kit;Block Cipher;Cbc Mode;MANET Node;Image Morphing;Forgery Detection;Identity Theft;Internal Data Bus;Identity Theft Victimization;PSO;Xilinx ISE;Policy Life Cycle;Intrusion Detection;Behavioral Biometrics
1. Information Security Policy and Standards
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Information Security;FPGA;blockchain technology;IoT Security;cryptocurrency;Information Security Policy;Vulnerability Management;optimization algorithms;Biometric Systems;lightweight cryptography;Id;Vice Versa;CIO;System Crash;Sleuth Kit;Block Cipher;Cbc Mode;MANET Node;Image Morphing;Forgery Detection;Identity Theft;Internal Data Bus;Identity Theft Victimization;PSO;Xilinx ISE;Policy Life Cycle;Intrusion Detection;Behavioral Biometrics