|
Showing 1 - 5 of
5 matches in All Departments
|
Multimedia Forensics and Security - Foundations, Innovations, and Applications (Hardcover, 1st ed. 2017)
Aboul Ella Hassanien, Mohamed Mostafa Fouad, Azizah Abdul Manaf, Mazdak Zamani, Rabiah Ahmad, …
|
R4,243
R3,667
Discovery Miles 36 670
Save R576 (14%)
|
Ships in 12 - 17 working days
|
This book presents recent applications and approaches as well as
challenges in digital forensic science. One of the evolving
challenges that is covered in the book is the cloud forensic
analysis which applies the digital forensic science over the cloud
computing paradigm for conducting either live or static
investigations within the cloud environment. The book also covers
the theme of multimedia forensics and watermarking in the area of
information security. That includes highlights on intelligence
techniques designed for detecting significant changes in image and
video sequences. Moreover, the theme proposes recent robust and
computationally efficient digital watermarking techniques. The last
part of the book provides several digital forensics related
applications, including areas such as evidence acquisition
enhancement, evidence evaluation, cryptography, and finally, live
investigation through the importance of reconstructing the botnet
attack scenario to show the malicious activities and files as
evidences to be presented in a court.
Information Security and Optimization maintains a practical
perspective while offering theoretical explanations. The book
explores concepts that are essential for academics as well as
organizations. It discusses aspects of techniques and
tools-definitions, usage, and analysis-that are invaluable for
scholars ranging from those just beginning in the field to
established experts. What are the policy standards? What are
vulnerabilities and how can one patch them? How can data be
transmitted securely? How can data in the cloud or cryptocurrency
in the blockchain be secured? How can algorithms be optimized?
These are some of the possible queries that are answered here
effectively using examples from real life and case studies.
Features: A wide range of case studies and examples derived from
real-life scenarios that map theoretical explanations with real
incidents. Descriptions of security tools related to digital
forensics with their unique features, and the working steps for
acquiring hands-on experience. Novel contributions in designing
organization security policies and lightweight cryptography.
Presentation of real-world use of blockchain technology and
biometrics in cryptocurrency and personalized authentication
systems. Discussion and analysis of security in the cloud that is
important because of extensive use of cloud services to meet
organizational and research demands such as data storage and
computing requirements. Information Security and Optimization is
equally helpful for undergraduate and postgraduate students as well
as for researchers working in the domain. It can be recommended as
a reference or textbook for courses related to cybersecurity.
This book presents recent applications and approaches as well as
challenges in digital forensic science. One of the evolving
challenges that is covered in the book is the cloud forensic
analysis which applies the digital forensic science over the cloud
computing paradigm for conducting either live or static
investigations within the cloud environment. The book also covers
the theme of multimedia forensics and watermarking in the area of
information security. That includes highlights on intelligence
techniques designed for detecting significant changes in image and
video sequences. Moreover, the theme proposes recent robust and
computationally efficient digital watermarking techniques. The last
part of the book provides several digital forensics related
applications, including areas such as evidence acquisition
enhancement, evidence evaluation, cryptography, and finally, live
investigation through the importance of reconstructing the botnet
attack scenario to show the malicious activities and files as
evidences to be presented in a court.
|
Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part I (Paperback, 2011)
Azizah Abd Manaf, Akram Zeki, Mazdak Zamani, Suriayati Chuprat, Eyas El-Qawasmeh
|
R3,055
Discovery Miles 30 550
|
Ships in 10 - 15 working days
|
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed
proceedings of the International Conference on Informatics
Engineering and Information Science, ICIEIS 2011, held in Kuala
Lumpur, Malaysia, in November 2011. The 210 revised full papers
presented together with invited papers in the 4 volumes were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on e-learning, information
security, software engineering, image processing, algorithms,
artificial intelligence and soft computing, e-commerce, data
mining, neural networks, social networks, grid computing, biometric
technologies, networks, distributed and parallel computing,
wireless networks, information and data management, web
applications and software systems, multimedia, ad hoc networks,
mobile computing, as well as miscellaneous topics in digital
information and communications.
|
Informatics Engineering and Information Science, Part II - International Conference, ICIEIS 2011, Kuala Lumpur, Malaysia, November 12-14, 2011. Proceedings, Part II (Paperback, 2011)
Azizah Abd Manaf, Akram Zeki, Mazdak Zamani, Suriayati Chuprat, Eyas El-Qawasmeh
|
R3,098
Discovery Miles 30 980
|
Ships in 10 - 15 working days
|
This 4-Volume-Set, CCIS 0251 - CCIS 0254, constitutes the refereed
proceedings of the International Conference on Informatics
Engineering and Information Science, ICIEIS 2011, held in Kuala
Lumpur, Malaysia, in November 2011. The 210 revised full papers
presented together with invited papers in the 4 volumes were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on e-learning, information
security, software engineering, image processing, algorithms,
artificial intelligence and soft computing, e-commerce, data
mining, neural networks, social networks, grid computing, biometric
technologies, networks, distributed and parallel computing,
wireless networks, information and data management, web
applications and software systems, multimedia, ad hoc networks,
mobile computing, as well as miscellaneous topics in digital
information and communications.
|
|