|
Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection
Technological innovation and evolution continues to improve
personal and professional lifestyles, as well as general
organizational and business practices; however, these advancements
also create potential issues in the security and privacy of the
user's information. Innovative Solutions for Access Control
Management features a comprehensive discussion on the trending
topics and emergent research in IT security and governance.
Highlighting theoretical frameworks and best practices, as well as
challenges and solutions within the topic of access control and
management, this publication is a pivotal reference source for
researchers, practitioners, students, database vendors, and
organizations within the information technology and computer
science fields.
Audio Content Security: Attack Analysis on Audio Watermarking
describes research using a common audio watermarking method for
four different genres of music, also providing the results of many
test attacks to determine the robustness of the watermarking in the
face of those attacks. The results of this study can be used for
further studies and to establish the need to have a particular way
of audio watermarking for each particular group of songs, each with
different characteristics. An additional aspect of this study tests
and analyzes two parameters of audio host file and watermark on a
specific evaluation method (PSNR) for audio watermarking.
Securing the Internet of Things provides network and cybersecurity
researchers and practitioners with both the theoretical and
practical knowledge they need to know regarding security in the
Internet of Things (IoT). This booming field, moving from strictly
research to the marketplace, is advancing rapidly, yet security
issues abound. This book explains the fundamental concepts of IoT
security, describing practical solutions that account for resource
limitations at IoT end-node, hybrid network architecture,
communication protocols, and application characteristics.
Highlighting the most important potential IoT security risks and
threats, the book covers both the general theory and practical
implications for people working in security in the Internet of
Things.
|
|