|
Showing 1 - 5 of
5 matches in All Departments
Cybersecurity is a critical concern for individuals and for
organizations of all types and sizes. Authentication and access
control are the first line of defense to help protect you from
being attacked. This book begins with the theoretical background of
cryptography and the foundations of authentication technologies and
attack mechanisms. You will learn about the mechanisms that are
available to protect computer networks, systems, applications, and
general digital technologies. Different methods of authentication
are covered, including the most commonly used schemes in password
protection: two-factor authentication and multi-factor
authentication. You will learn how to securely store passwords to
reduce the risk of compromise. Biometric authentication-a mechanism
that has gained popularity over recent years-is covered, including
its strengths and weaknesses. Authentication and Access Control
explains the types of errors that lead to vulnerabilities in
authentication mechanisms. To avoid these mistakes, the book
explains the essential principles for designing and implementing
authentication schemes you can use in real-world situations.
Current and future trends in authentication technologies are
reviewed. What You Will Learn Understand the basic principles of
cryptography before digging into the details of authentication
mechanisms Be familiar with the theories behind password generation
and the different types of passwords, including graphical and
grid-based passwords Be aware of the problems associated with the
use of biometrics, especially with establishing a suitable level of
biometric matching or the biometric threshold value Study examples
of multi-factor authentication protocols and be clear on the
principles Know how to establish authentication and how key
establishment processes work together despite their differences Be
well versed on the current standards for interoperability and
compatibility Consider future authentication technologies to solve
today's problems Who This Book Is For Cybersecurity practitioners
and professionals, researchers, and lecturers, as well as
undergraduate and postgraduate students looking for supplementary
information to expand their knowledge on authentication mechanisms
This proceedings book presents recent research work and results in
the area of communication and information technologies. The
chapters of this book contain the main, well-selected and reviewed
contributions of scientists who met at the 12th International
Conference on Computing and Information Technology (IC2IT) held
during 7th - 8th July 2016 in Khon Kaen, Thailand The book is
divided into three parts: "User Centric Data Mining and Text
Processing", "Data Mining Algoritms and their Applications" and
"Optimization of Complex Networks".
This book presents recent research work and results in the area of
communication and information technologies. The book includes the
main results of the 11th International Conference on Computing and
Information Technology (IC2IT) held during July 2nd-3rd, 2015 in
Bangkok, Thailand. The book is divided into the two main parts Data
Mining and Machine Learning as well as Data Network and
Communications. New algorithms and methods of data mining asr
discussed as well as innovative applications and state-of-the-art
technologies on data mining, machine learning and data networking.
Computer and Information Technology (CIT) are now involved in
governmental, industrial, and business domains more than ever.
Thus, it is important for CIT personnel to continue academic
research to improve technology and its adoption to modern
applications. The up-to-date research and technologies must be
distributed to researchers and CIT community continuously to aid
future development. The 10th International Conference on Computing
and Information Technology (IC 2 IT2014) organized by King
Mongkut's University of Technology North Bangkok (KMUTNB) and
partners provides an exchange of the state of the art and future
developments in the two key areas of this process: Computer
Networking and Data Mining. Behind the background of the foundation
of ASEAN, it becomes clear that efficient languages, business
principles and communication methods need to be adapted, unified
and especially optimized to gain a maximum benefit to the users and
customers of future IT systems.
This volume contains the papers of the 9th International Conference
on Computing and Information Technology (IC2IT 2013) held at King
Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok,
Thailand, on May 9th-10th, 2013. Traditionally, the conference is
organized in conjunction with the National Conference on Computing
and Information Technology, one of the leading Thai national events
in the area of Computer Science and Engineering. The conference as
well as this volume is structured into 3 main tracks on Data
Networks/Communication, Data Mining/Machine Learning, and Human
Interfaces/Image processing.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|