Mechanics of User Identification and Authentication, Todorov, Dobromir
Автор: Bock, Lisa Название: Identity management with biometrics ISBN: 1838988386 ISBN-13(EAN): 9781838988388 Издательство: Неизвестно Рейтинг: Цена: 53940.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Biometric technology provides a robust and convenient method for authenticating an individual`s identity using fingerprint, iris, voice, palm print, or facial recognition. Identity Management with Biometrics will help you identify and address the challenges that you will need to consider as you move into the next iteration of identity protection.
Автор: Saracino Название: Emerging Technologies for Authorization and Authentication ISBN: 303125466X ISBN-13(EAN): 9783031254666 Издательство: Springer Рейтинг: Цена: 51230.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022. The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.
Автор: Mandal Jyotsna Kumar Название: Reversible Steganography and Authentication Via Transform Encoding ISBN: 9811543992 ISBN-13(EAN): 9789811543999 Издательство: Springer Цена: 149060.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.
Автор: Mayoral Fernando Название: Instant Java Password and Authentication Security ISBN: 1849697760 ISBN-13(EAN): 9781849697767 Издательство: Неизвестно Рейтинг: Цена: 36770.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Mandal Jyotsna Kumar Название: Reversible Steganography and Authentication Via Transform Encoding ISBN: 9811543968 ISBN-13(EAN): 9789811543968 Издательство: Springer Рейтинг: Цена: 149060.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication.
Автор: Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mi Название: Authentication in IoT ISBN: 1119527929 ISBN-13(EAN): 9781119527923 Издательство: Wiley Рейтинг: Цена: 110830.00 T Наличие на складе: Невозможна поставка. Описание:
An up-to-date guide to an overview of authentication in the Internet of Things (IoT)
The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors--noted experts on the topic--provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book:
Offers an authoritative reference designed for use by all IoT stakeholders
Includes information for securing devices at the user, device, and network levels
Contains a classification of existing vulnerabilities
Written by an international group of experts on the topic
Provides a guide to the most current information available on IoT security
Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.
Автор: Sebastian Pape Название: Authentication in Insecure Environments ISBN: 365807115X ISBN-13(EAN): 9783658071158 Издательство: Springer Рейтинг: Цена: 69650.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, users may not want to be tracked while their service provider does not want them to share their credentials. To prevent service providers from keeping their users under surveillance, anonymous credentials may be used.
Автор: Chapple Mike Название: Access Control, Authentication, and Public Key Infrastructur ISBN: 1284031594 ISBN-13(EAN): 9781284031591 Издательство: Jones & Bartlett Рейтинг: Цена: 128060.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work as well as testing and managing them. New to the Second Edition: Updated references to Windows 8 and Outlook 2011 A new discussion of recent Chinese hacking incidence Examples depicting the risks associated with a missing unencrypted laptop containing private data. New sections on the Communications Assistance for Law Enforcement Act (CALEA) and granting Windows folder permissions are added. New information on the Identity Theft Enforcement and Restitution Act and the Digital Millennium Copyright Act (DMCA).
Автор: Dingyi Pei Название: Authentication Codes and Combinatorial Designs ISBN: 1584884738 ISBN-13(EAN): 9781584884736 Издательство: Taylor&Francis Рейтинг: Цена: 132710.00 T Наличие на складе: Невозможна поставка. Описание: Covers optimal authentication codes, unconditionally secure authentication schemes, and both symmetric and asymmetric authentication codes. This book ties together the notion of authentication codes and combinatorial designs and demonstrates how ideas from combinatorics can be used for cryptographic applications.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz