Browse Results

Showing 29,576 through 29,600 of 64,173 results

Information Security in Healthcare: Managing Risk (HIMSS Book Series)

by Terrell W. Herzig

Information Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment. Combining the experience and insights of top healthcare IT managers and information security professionals, this book offers detailed coverage of myriad

Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson (Lecture Notes in Computer Science #15600)

by Reihaneh Safavi-Naini Colin Boyd Leonie Simpson

This Festschrift is a celebration of Ed Dawson's life and impact on research, teaching and leadership. Ed originally trained as a mathematician and first worked as a schoolteacher before joining Queensland Institute (later University) of Technology where he engaged with the emerging world of applied cryptology. He first concentrated on symmetric-key cryptography, analyzing randomness, searching for new building blocks and designing cryptographic engines, he later expanded his interests to public-key cryptography with a particular focus on the implementation aspects of elliptic curves. Ed was made a Fellow of the IACR for his visionary service and for fostering the Asia-Pacific cryptographic community. He cofounded conferences, workshops, courses and communities, first in Australia and then throughout the Pacific Rim. Ed's instincts and experiences were always interdisciplinary and he developed successful networks of researchers and practitioners in mathematics, computer science, engineering, business and law. In recent years he broadened his expertise to incorporate the human, socio-technical, aspects of security. Throughout his career Ed was a noted teacher, mentor and motivator, building and encouraging teams with effort, knowledge, enthusiasm and humor. His successes are reflected in the papers contributed to this volume.

Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence #978)

by Madhusudan Singh

This book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.

Information Security, Privacy and Digital Forensics: Select Proceedings of the International Conference, ICISPD 2022 (Lecture Notes in Electrical Engineering #1075)

by S. S. Iyengar Sankita J. Patel Bhavesh N. Gohil Naveen Kumar Chaudhary

This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.

Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science #973)

by Jan Eloff Hein Venter Marianne Loock Marijke Coetzee Mariki Eloff

This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.

Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)

by Phong Q. Nguyen and Jianying Zhou

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings (Lecture Notes in Computer Science #11060)

by Liqun Chen Mark Manulis Steve Schneider

This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.

Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings (Lecture Notes in Computer Science #11723)

by Michalis Polychronakis Zhiqiang Lin Charalampos Papamanthou

This book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.

Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings (Lecture Notes in Computer Science #12472)

by Robert H. Deng Yannan Li Willy Susilo Fuchun Guo Rolly Intan

This book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.

Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings (Lecture Notes in Computer Science #13118)

by Sokratis Katsikas Joseph K. Liu Willy Susilo Weizhi Meng Rolly Intan

This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.

Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13640)

by Xiaofeng Chen Willy Susilo Fuchun Guo Rolly Intan Yudi Zhang

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings (Lecture Notes in Computer Science #14411)

by Elias Athanasopoulos Bart Mennink

This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.

Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15257)

by Nicky Mouha Nick Nikiforakis

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15258)

by Nicky Mouha Nick Nikiforakis

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.

Information Security: 28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings (Lecture Notes in Computer Science #16186)

by Sang Kil Cha Jeongeun Park

The book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025. The 32 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.

Information Security: Design, Implementation, Measurement, and Compliance

by Timothy P. Layton

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.

Information Security: Opportunities and Limitations

by Thomas Liedtke

This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?

Information Security: Principles and Practice

by Mark Stamp

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.

Information Security: Principles and Practice

by Mark Stamp

INFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software security issues, ranging from malware detection to secure software development Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.

Information Services Design: A Design Science Approach for Sustainable Knowledge (Routledge Studies in Organization and Systems)

by Fons Wijnhoven

Information services are economic and organizational activities for informing people. Because informing is changing rapidly under the influence of internet-technologies, this book presents in Chapter 1 fundamental notions of information and knowledge, based on philosopher C.W. Churchman’s inquiring systems. This results in the identification of three product-oriented design theory aspects: content, use value and revenue. Chapter 2 describes how one can cope with these aspects by presenting process-oriented design theory. Both design theory insights are applied in chapters on information services challenges, their business concepts and processes, their architectures and exploitation. The final chapter discusses three case studies that integrate the insights from previous chapters, and it discusses some ideas for future research. This book gives students a coherent start to the topic of information services from a design science perspective, with a balance between technical and managerial aspects. Therefore, this book is useful for modern curricula of management, communication science and information systems. Because of its design science approach, it also explains design science principles. The book also serves professionals and academics in search of a foundational understanding of informing as a science and management practice.

Information Society Development through ICT Market Strategies

by Ermelinda Kordha Tolica Kozeta Sevrani Klodiana Gorica

​This book examines the relationship between information society and information communication technology (ICT) markets, while evaluating the ICT impact on Albanian society and its economy. It offers insights on the country's information society development and compares it to other nations. The book begins with a general introduction to information society and efforts that can be used for ICT strategy. It then takes a look at ICT as an industrial sector and uncovers the importance for a strong ICT infrastructure management. Using this background information, the book finally explores the growing information society and ICT sector found in Albania. It measures the information society being created, and compares it to other countries in South Eastern Europe. Next the authors introduce a theoretical model for ICT driven development, focusing on ICT innovation and investment as factors that can affect the ICT market. These factors have also taken into account for strategy development in the national and industry level. ​

Information Society and Media Development in Modern Mongolia (North East Asian Studies)

by Undrah Baasanjav

This book provides an account of Mongolian information society from the perspective of critical media studies. The converged media sphere in modern Mongolia mirrors and shapes political communication, economic outlook, institutional norms, and Mongolian identity. When placing Mongolia on the global information society map, the arguments in the book juxtapose information society tenets and structural constraints like the small market, communist past, and mining-dependent economy. Today, people in Mongolia take advantage of the mobility, speed, and spatiality of the internet, as the Mongolians of old once saddled their horses and galloped across the grassy steps of Eurasia.

Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organizations #Vol. 1)

by Jeff Hearn Tuula Heiskanen

Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.

Information Spread in a Social Media Age: Modeling and Control

by Michael Muhlmeyer Shaurya Agarwal

The rise of social networks and social media has led to a massive shift in the ways information is dispersed. Platforms like Twitter and Facebook allow people to more easily connect as a community, but they can also be avenues for misinformation, fake news, and polarization. The need to examine, model, and analyze the trajectory of information spread within this new paradigm has never been greater. This text expands upon the authors’ combined teaching experience, engineering knowledge, and multiple academic journal publications on these topics to present an intuitive and easy to understand exploration of social media information spread alongside the technical and mathematical concepts. By design, this book uses simple language and accessible and modern case studies (including those centered around United States mass shootings, the #MeToo social movement, and more) to ensure it is accessible to the casual reader. At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. By reading this book and working through the included exercises, readers will gain a general understanding of modern social media systems, network fundamentals, model development techniques, and social marketing. The mathematical modeling of information spread over social media is heavily emphasized through a review of existing epidemiology and marketing based models. The book then presents novel models developed by the authors to account for modern social media concerns such as community filter bubbles, strongly polarized groups, and contentious information spread. Readers will learn how to build and execute simple case studies using Twitter data to help verify the text’s proposed models. Once the reader is armed with a fundamental understanding of mathematical modeling and social media-based system considerations, the book introduces more complex engineering control concepts, including controller design, PID control, and optimal control. Examples of control methods for social campaigns and misinformation mitigation applications are covered in a step-by-step format from problem formulation to solution simulation and results discussions. While many of the examples and methods are framed in the context of controlling social media information spread, the material is also directly applicable to many different types of controllable systems. With the essential background, models, and tools presented within, any interested reader can take the first steps toward exploring and taming the growing complexity of the modern social media age.

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

by Emc Education Services

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Refine Search

Showing 29,576 through 29,600 of 64,173 results