
Information Security and Optimization
- 206 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Information Security and Optimization
About this book
Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and toolsâdefinitions, usage, and analysisâthat are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies.
Features:
- A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents.
- Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience.
- Novel contributions in designing organization security policies and lightweight cryptography.
- Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems.
- Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements.
Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Table of Contents
- The Editors
- Contributors
- 1. Information Security Policy and Standards
- 2. Vulnerability Management
- 3. Identity Theft and Prevention
- 4. Organization Security Policies and Their After Effects
- 5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them?
- 6. Cryptography and Steganography Techniques
- 7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis
- 8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms
- 9. Analysis of Classification-Based Intrusion-Detection Techniques
- 10. Cryptocurrency and Blockchain
- 11. Cyber Security in Cloud Platforms
- 12. BiometricsâUnique Identity Verification System
- 13. Security Tools
- 14. Introduction to Optimization AlgorithmsâBio Inspired
- Appendix: Policy Template
- Index