Information Security and Optimization
Herausgeber: Tanwar, Rohit; Gupta, Sunil; Zamani, Mazdak; Choudhury, Tanupriya
Information Security and Optimization
Herausgeber: Tanwar, Rohit; Gupta, Sunil; Zamani, Mazdak; Choudhury, Tanupriya
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Maintaining a practical perspective along with theoretical explanations, this book explores the concepts, discussion, analysis of techniques and tools about what are the policy standards, what are vulnerabilities, how to patch them, how to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, etc.
Andere Kunden interessierten sich auch für
- Brian J EvansA Simple Guide to Technology and Analytics101,99 €
- Anchit BijalwanNetwork Forensics186,99 €
- Computational Intelligence for Human Action Recognition120,99 €
- Swarm Intelligence for Cloud Computing153,99 €
- Security and Privacy in the Internet of Things167,99 €
- From Visual Surveillance to Internet of Things178,99 €
- Lin MuInformation Engineering for Ports and Marine Environments189,99 €
-
-
-
Maintaining a practical perspective along with theoretical explanations, this book explores the concepts, discussion, analysis of techniques and tools about what are the policy standards, what are vulnerabilities, how to patch them, how to transmit data securely, how to secure data on the cloud, cryptocurrency and blockchain, etc.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 224
- Erscheinungstermin: 12. Januar 2021
- Englisch
- Abmessung: 254mm x 178mm x 14mm
- Gewicht: 608g
- ISBN-13: 9780367493455
- ISBN-10: 0367493454
- Artikelnr.: 60010865
- Verlag: CRC Press
- Seitenzahl: 224
- Erscheinungstermin: 12. Januar 2021
- Englisch
- Abmessung: 254mm x 178mm x 14mm
- Gewicht: 608g
- ISBN-13: 9780367493455
- ISBN-10: 0367493454
- Artikelnr.: 60010865
Dr. Rohit Tanwar received his bachelor's degree in CSE from Kurukshetra University, Kurukshetra, India, and master's Degree in CSE from YMCA University of Science and Technology, Faridabad, India. He received his PhD from Kurukshetra University in 2019. He has more than 10 years of experience in teaching. Currently, he is working as an Assistant Professor in dept. of CSE at UPES Dehradun. His areas of interests include Network Security, Optimization Techniques, Human computing, Soft computing, Cloud computing, Data Mining, etc. He has more than twenty publications to his credit in different reputed journals and conferences. He has been associated with many conferences throughout India as TPC member and session chair etc. Dr. Tanwar is associated as an editor of two forthcoming books with CRC Press and Scrivener Publishing (Wiley) respectively. He is a special issues editor in the journal EAI Endorsed on Transactions on Pervasive Health and Technology (Scopus Indexed). He is associated with International Journal of Communication Systems (SCIE) (WILEY), and International Journal of Information Security and Privacy (IJISP) (Scopus, ESCI), IGI Global as an active reviewer. He is supervising two PhD research scholar in the fields of security and optimization. He is a lifetime member of Indian Engineering Teachers Association, India and other renowned technical societies. He is holding the post of Joint Secretary, Faridabad Chapter of INDO-UK Confederation of Science Technology and Research, London. He is a certified Microsoft Technology Associate for Introduction to Programming using Python. Dr. Tanupriya Choudhury received his bachelor's degree in CSE from West Bengal University of Technology, Kolkata, India, and master's Degree in CSE from Dr. M.G.R University, Chennai, India. He received his PhD in the year 2016. He has 10 years of experience in teaching as well as in research. He is currently working as an Associate Professor in dept. of CSE at UPES Dehradun. He received Global Outreach Education Award for Excellence in best Young researcher Award in GOECA 2018. His areas of interests include Human computing, Soft computing, Cloud computing, Data Mining etc. He has filed 14 patents till date and received 16 copyrights from MHRD for his own softwares. He has been associated with many conferences in India and abroad. He has authored more than 85 research papers till date. He has delivered invited talk and guest lectures in Jamia Millia Islamia University, Maharaja Agersen college of Delhi University, Duy Tan University Vietnam etc. He has been associated with many conferences throughout India as TPC member and session chair etc. He is a lifetime member of IETA, member of IEEE, and member of IET(UK) and other renowned technical societies. He is associated with Corporate and he is Technical Adviser of DeetyaSoft Pvt. Ltd. Noida , IVRGURU ,and Mydigital360 etc.He is holding the post of Secretary in IETA (Indian Engineering Teacher's Association-India), He is also holding the Advisor Position in INDO-UK Confederation of Science, Technology and Research Ltd., London, UK and International Association of Professional and Fellow Engineers-Delaware-USA. Mazdak Zamani received his Ph.D. in Computer Science from Universiti Teknologi Malaysia in 2011. He was a Research Student Grant in 2008-2010. He has been an active contributor to his field of research for more than nine years by teaching several courses, designing several courses, serving as leader and researcher in several grants, supervision of students in PhD and Master degree, serving as chair in a research track, serving as external/ internal examiner in PhD/Master thesis assessment, coordinator Research and Development, participating in industrial collaboration, Memorandum of Understanding with other university, and Letter of Intent with government section. Dr. Zamani has published more than 100 journal papers, conference proceeding papers, book chapters, and books on related topics to his area of interest, including Cybersecurity, Multimedia Security, Network Security, and Information Technology. He also has been very active as chair/ technical committee/ program committee in more than 100 international conferences. He has acted as reviewer and editor in more than 50 international journals. Dr. Sunil Gupta has over more than 19 Years of experience in teaching, research and industry in the field of Computer science and Engineering. Prior to joining UPES as a Professor, he has worked with, BML Munjal University, Delhi Technical Campus, IP University, Northern India Engineering College, IP University, IIMT, Baddi University of Emerging Science, IFTM University and Physical Laboratory. He is an active member of IEEE Society, Computer Society of India, Member, Computer Science Teacher Association, Life Member, International Association of Engineers, Member, International Association of Computer Science and Information Technology, Member, and Internet Society (ISOC). He has conducted various workshops, conferences and FDP. He Guides various students for research and project work. He is an authored 69 research papers, Six Patents and 2 textbooks, Cryptography and Network Security and Wireless Sensor Networks. His academic interest includes Security, Cloud Computing, Big Data, Sensor, Wireless Networks, and Healthcare. He has successfully completed various research projects and consultancy from government and private organization like, Department of Science and technology, Xcrino business solutions and more. He is a reviewer of international journals namely Journal of Supercomputing, published by Springer Netherlands., International Journal of Wireless Networks by Springer, International Journal Computer and Electrical Engineering, Singapore and Member of Scientific Committee and Editorial Review Board on Engineering and Physical Sciences for World Academy of Science, Engineering and Technology and many more.
1. Information Security Policy and Standards
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life
Cyber-Attacks, How Do They Affect Real Life and What Should We Do About
Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT
Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery
Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life
Cyber-Attacks, How Do They Affect Real Life and What Should We Do About
Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT
Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery
Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
1. Information Security Policy and Standards
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life
Cyber-Attacks, How Do They Affect Real Life and What Should We Do About
Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT
Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery
Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index
2. Vulnerability Management
3. Identity Theft and Prevention
4. Organization Security Policies and Their After Effects
5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life
Cyber-Attacks, How Do They Affect Real Life and What Should We Do About
Them?
6. Cryptography and Steganography Techniques
7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT
Security and Its Cryptanalysis
8. An Overview of Digital Image Forensics: Image Morphing and Forgery
Detection Algorithms
9. Analysis of Classification-Based Intrusion-Detection Techniques
10. Cryptocurrency and Blockchain
11. Cyber Security in Cloud Platforms
12. Biometrics-Unique Identity Verification System
13. Security Tools
14. Introduction to Optimization Algorithms-Bio Inspired
Appendix
Index