Authentication یا احراز هویت به فرآیندی گفته می شود که در آن ارسال کننده یا دریافت کننده اطلاعات برای همدیگر اطلاعاتی را ارائه می کنند تا مطمئن شوند آنها همانی هستند که ادعا می کنند. به نوعی در احراز هویت بررسی می شود که شخص یا … همانی هست که ادعا می کند. اگر ارسال کننده یا دریافت کننده اطلاعات نتوانند به درستی برای همدیگر احراز هویت شوند در این میان اعتمادی ایجاد نمی شود که آنها بتوانند با همدیگر تبادل اطلاعات داشته باشند…
کتاب Security and Authentication: Perspectives, Management and Challenges
دانلود – حجم : 10 مگابايت
رمز فايل: technet24.ir
Nova | English | 2018 | ISBN-10: 1536129429 | 271 pages
by Ong Thian Song (Author, Editor), Tee Connie (Editor), Mohd Shohel Sayeed (Editor)
Issues around security and privacy have received greater attention as the world becomes more digitized and interconnected. There are a myriad of technological advances like smart mobile devices, wearable devices, Internet of Things (IoTs), cloud computing and social networks that benefit people all over the world, transforming how they work and communicate with each other. However, these new technologies also bring new security and privacy challenges. For example, there are massive attacks by malicious malware like WannaCry that cost great financial loss to individuals and institutions. Besides, there are ample amounts of software and programs that quitely collect, share and sometimes disclose huge amounts of personal information.
This Authentication book presents the current popular issues in information security and privacy, covering human users, hardware and software, the Internet and also communication protocols. The book provides a comprehensive combination of studies that offer integrated solutions to security and authentication problems. The topics covered in the book include mobile authentication systems, security in wireless sensor networks and IoTs, network-based intrusion detection systems, privacy protection in machine learning, deep learning for surveillance, and also targeted image forensics. An understanding of these areas ensures the ability to adapt to and address new challenges in the technological dependent world as these fields evolve.
The primary target audiences of this book are students and researchers from security technology and information technology management. The editors have been blessed by the assistance of many people concerning all aspects for the preparation of this book. The editors would like to express their sincere gratitude to the anonymous reviewers for their professional support and dedication to reviewing the chapters of this book. Last but not least, special thanks also go out to Nova Science Publishers for presenting the opportunity to prepare and publish this book.
Series: Cybercrime and Cybersecurity Research