|
Showing 1 - 4 of
4 matches in All Departments
In this book the author presents ten key laws governing information
security. He addresses topics such as attacks, vulnerabilities,
threats, designing security, identifying key IP assets,
authentication, and social engineering. The informal style draws on
his experience in the area of video protection and DRM, while the
text is supplemented with introductions to the core formal
technical ideas. It will be of interest to professionals and
researchers engaged with information security.
Content protection and digital rights management (DRM) are fields
that receive a lot of attention: content owners require systems
that protect and maximize their revenues; consumers want backwards
compatibility, while they fear that content owners will spy on
their viewing habits; and academics are afraid that DRM may be a
barrier to knowledge sharing. DRM technologies have a poor
reputation and are not yet trusted. This book describes the key
aspects of content protection and DRM systems, the objective being
to demystify the technology and techniques. In the first part of
the book, the author builds the foundations, with sections that
cover the rationale for protecting digital video content; video
piracy; current toolboxes that employ cryptography, watermarking,
tamper resistance, and rights expression languages; different ways
to model video content protection; and DRM. In the second part, he
describes the main existing deployed solutions, including video
ecosystems; how video is protected in broadcasting; descriptions of
DRM systems, such as Microsoft's DRM and Apple's FairPlay;
techniques for protecting prerecorded content distributed using
DVDs or Blu-ray; and future methods used to protect content within
the home network. The final part of the book looks towards future
research topics, and the key problem of interoperability. While the
book focuses on protecting video content, the DRM principles and
technologies described are also used to protect many other types of
content, such as ebooks, documents and games. The book will be of
value to industrial researchers and engineers developing related
technologies, academics and students in information security,
cryptography and media systems, and engaged consumers.
In this book the author presents ten key laws governing information
security. He addresses topics such as attacks, vulnerabilities,
threats, designing security, identifying key IP assets,
authentication, and social engineering. The informal style draws on
his experience in the area of video protection and DRM, while the
text is supplemented with introductions to the core formal
technical ideas. It will be of interest to professionals and
researchers engaged with information security.
Content protection and digital rights management (DRM) are fields
that receive a lot of attention: content owners require systems
that protect and maximize their revenues; consumers want backwards
compatibility, while they fear that content owners will spy on
their viewing habits; and academics are afraid that DRM may be a
barrier to knowledge sharing. DRM technologies have a poor
reputation and are not yet trusted. This book describes the key
aspects of content protection and DRM systems, the objective being
to demystify the technology and techniques. In the first part of
the book, the author builds the foundations, with sections that
cover the rationale for protecting digital video content; video
piracy; current toolboxes that employ cryptography, watermarking,
tamper resistance, and rights expression languages; different ways
to model video content protection; and DRM. In the second part, he
describes the main existing deployed solutions, including video
ecosystems; how video is protected in broadcasting; descriptions of
DRM systems, such as Microsoft's DRM and Apple's FairPlay;
techniques for protecting prerecorded content distributed using
DVDs or Blu-ray; and future methods used to protect content within
the home network. The final part of the book looks towards future
research topics, and the key problem of interoperability. While the
book focuses on protecting video content, the DRM principles and
technologies described are also used to protect many other types of
content, such as ebooks, documents and games. The book will be of
value to industrial researchers and engineers developing related
technologies, academics and students in information security,
cryptography and media systems, and engaged consumers.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
Loot
Nadine Gordimer
Paperback
(2)
R205
R164
Discovery Miles 1 640
|