Information Security and Optimization
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer science > Information Security and Optimization
Information Security and Optimization

Information Security and Optimization


     0     
5
4
3
2
1



Available


X
About the Book

Information Security and Optimization maintains a practical perspective while offering theoretical explanations. The book explores concepts that are essential for academics as well as organizations. It discusses aspects of techniques and tools—definitions, usage, and analysis—that are invaluable for scholars ranging from those just beginning in the field to established experts. What are the policy standards? What are vulnerabilities and how can one patch them? How can data be transmitted securely? How can data in the cloud or cryptocurrency in the blockchain be secured? How can algorithms be optimized? These are some of the possible queries that are answered here effectively using examples from real life and case studies. Features: A wide range of case studies and examples derived from real-life scenarios that map theoretical explanations with real incidents. Descriptions of security tools related to digital forensics with their unique features, and the working steps for acquiring hands-on experience. Novel contributions in designing organization security policies and lightweight cryptography. Presentation of real-world use of blockchain technology and biometrics in cryptocurrency and personalized authentication systems. Discussion and analysis of security in the cloud that is important because of extensive use of cloud services to meet organizational and research demands such as data storage and computing requirements. Information Security and Optimization is equally helpful for undergraduate and postgraduate students as well as for researchers working in the domain. It can be recommended as a reference or textbook for courses related to cybersecurity.

Table of Contents:
1. Information Security Policy and Standards 2. Vulnerability Management 3. Identity Theft and Prevention 4. Organization Security Policies and Their After Effects 5. Cyber-Attacks and Their Impact on Real Life: What Are Real-Life Cyber-Attacks, How Do They Affect Real Life and What Should We Do About Them? 6. Cryptography and Steganography Techniques 7. An FPGA-Based Advanced Lightweight Cryptography Architecture for IoT Security and Its Cryptanalysis 8. An Overview of Digital Image Forensics: Image Morphing and Forgery Detection Algorithms 9. Analysis of Classification-Based Intrusion-Detection Techniques 10. Cryptocurrency and Blockchain 11. Cyber Security in Cloud Platforms 12. Biometrics–Unique Identity Verification System 13. Security Tools 14. Introduction to Optimization Algorithms–Bio Inspired Appendix Index

About the Author :
Dr. Rohit Tanwar received his bachelor’s degree in CSE from Kurukshetra University, Kurukshetra, India, and master’s Degree in CSE from YMCA University of Science and Technology, Faridabad, India. He received his PhD from Kurukshetra University in 2019. He has more than 10 years of experience in teaching. Currently, he is working as an Assistant Professor in dept. of CSE at UPES Dehradun. His areas of interests include Network Security, Optimization Techniques, Human computing, Soft computing, Cloud computing, Data Mining, etc. He has more than twenty publications to his credit in different reputed journals and conferences. He has been associated with many conferences throughout India as TPC member and session chair etc. Dr. Tanwar is associated as an editor of two forthcoming books with CRC Press and Scrivener Publishing (Wiley) respectively. He is a special issues editor in the journal EAI Endorsed on Transactions on Pervasive Health and Technology (Scopus Indexed). He is associated with International Journal of Communication Systems (SCIE) (WILEY), and International Journal of Information Security and Privacy (IJISP) (Scopus, ESCI), IGI Global as an active reviewer. He is supervising two PhD research scholar in the fields of security and optimization. He is a lifetime member of Indian Engineering Teachers Association, India and other renowned technical societies. He is holding the post of Joint Secretary, Faridabad Chapter of INDO-UK Confederation of Science Technology and Research, London. He is a certified Microsoft Technology Associate for Introduction to Programming using Python. Dr. Tanupriya Choudhury received his bachelor’s degree in CSE from West Bengal University of Technology, Kolkata, India, and master’s Degree in CSE from Dr. M.G.R University, Chennai, India. He received his PhD in the year 2016. He has 10 years of experience in teaching as well as in research. He is currently working as an Associate Professor in dept. of CSE at UPES Dehradun. He received Global Outreach Education Award for Excellence in best Young researcher Award in GOECA 2018. His areas of interests include Human computing, Soft computing, Cloud computing, Data Mining etc. He has filed 14 patents till date and received 16 copyrights from MHRD for his own softwares. He has been associated with many conferences in India and abroad. He has authored more than 85 research papers till date. He has delivered invited talk and guest lectures in Jamia Millia Islamia University, Maharaja Agersen college of Delhi University, Duy Tan University Vietnam etc. He has been associated with many conferences throughout India as TPC member and session chair etc. He is a lifetime member of IETA, member of IEEE, and member of IET(UK) and other renowned technical societies. He is associated with Corporate and he is Technical Adviser of DeetyaSoft Pvt. Ltd. Noida , IVRGURU ,and Mydigital360 etc.He is holding the post of Secretary in IETA (Indian Engineering Teacher’s Association-India), He is also holding the Advisor Position in INDO-UK Confederation of Science, Technology and Research Ltd., London, UK and International Association of Professional and Fellow Engineers-Delaware-USA. Mazdak Zamani received his Ph.D. in Computer Science from Universiti Teknologi Malaysia in 2011. He was a Research Student Grant in 2008-2010. He has been an active contributor to his field of research for more than nine years by teaching several courses, designing several courses, serving as leader and researcher in several grants, supervision of students in PhD and Master degree, serving as chair in a research track, serving as external/ internal examiner in PhD/Master thesis assessment, coordinator Research and Development, participating in industrial collaboration, Memorandum of Understanding with other university, and Letter of Intent with government section. Dr. Zamani has published more than 100 journal papers, conference proceeding papers, book chapters, and books on related topics to his area of interest, including Cybersecurity, Multimedia Security, Network Security, and Information Technology. He also has been very active as chair/ technical committee/ program committee in more than 100 international conferences. He has acted as reviewer and editor in more than 50 international journals. Dr. Sunil Gupta has over more than 19 Years of experience in teaching, research and industry in the field of Computer science and Engineering. Prior to joining UPES as a Professor, he has worked with, BML Munjal University, Delhi Technical Campus, IP University, Northern India Engineering College, IP University, IIMT, Baddi University of Emerging Science, IFTM University and Physical Laboratory. He is an active member of IEEE Society, Computer Society of India, Member, Computer Science Teacher Association, Life Member, International Association of Engineers, Member, International Association of Computer Science and Information Technology, Member, and Internet Society (ISOC). He has conducted various workshops, conferences and FDP. He Guides various students for research and project work. He is an authored 69 research papers, Six Patents and 2 textbooks, Cryptography and Network Security and Wireless Sensor Networks. His academic interest includes Security, Cloud Computing, Big Data, Sensor, Wireless Networks, and Healthcare. He has successfully completed various research projects and consultancy from government and private organization like, Department of Science and technology, Xcrino business solutions and more. He is a reviewer of international journals namely Journal of Supercomputing, published by Springer Netherlands., International Journal of Wireless Networks by Springer, International Journal Computer and Electrical Engineering, Singapore and Member of Scientific Committee and Editorial Review Board on Engineering and Physical Sciences for World Academy of Science, Engineering and Technology and many more.


Best Sellers


Product Details
  • ISBN-13: 9780367493455
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Chapman & Hall/CRC
  • Height: 254 mm
  • No of Pages: 224
  • Width: 178 mm
  • ISBN-10: 0367493454
  • Publisher Date: 12 Jan 2021
  • Binding: Hardback
  • Language: English
  • Weight: 453 gr


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Information Security and Optimization
Taylor & Francis Ltd -
Information Security and Optimization
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Information Security and Optimization

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!