Handbook of Research on Securing Cloud-Based Databases with Biometric Applications

Handbook of Research on Securing Cloud-Based Databases with Biometric Applications
Author: Deka, Ganesh Chandra
Publisher: IGI Global
Total Pages: 556
Release: 2014-10-31
Genre: Computers
ISBN: 1466665602

Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.

Handbook of Research on Security Considerations in Cloud Computing

Handbook of Research on Security Considerations in Cloud Computing
Author: Munir, Kashif
Publisher: IGI Global
Total Pages: 433
Release: 2015-07-28
Genre: Computers
ISBN: 1466683880

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Handbook of Research on Multimedia Cyber Security

Handbook of Research on Multimedia Cyber Security
Author: Gupta, Brij B.
Publisher: IGI Global
Total Pages: 372
Release: 2020-04-03
Genre: Computers
ISBN: 179982702X

Because it makes the distribution and transmission of digital information much easier and more cost effective, multimedia has emerged as a top resource in the modern era. In spite of the opportunities that multimedia creates for businesses and companies, information sharing remains vulnerable to cyber attacks and hacking due to the open channels in which this data is being transmitted. Protecting the authenticity and confidentiality of information is a top priority for all professional fields that currently use multimedia practices for distributing digital data. The Handbook of Research on Multimedia Cyber Security provides emerging research exploring the theoretical and practical aspects of current security practices and techniques within multimedia information and assessing modern challenges. Featuring coverage on a broad range of topics such as cryptographic protocols, feature extraction, and chaotic systems, this book is ideally designed for scientists, researchers, developers, security analysts, network administrators, scholars, IT professionals, educators, and students seeking current research on developing strategies in multimedia security.

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities

Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities
Author: Ng, Alex Chi Keung
Publisher: IGI Global
Total Pages: 259
Release: 2018-01-26
Genre: Computers
ISBN: 1522548297

Due to the proliferation of distributed mobile technologies and heavy usage of social media, identity and access management has become a very challenging area. Businesses are facing new demands in implementing solutions, however, there is a lack of information and direction. Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities is a critical scholarly resource that explores management of an organization’s identities, credentials, and attributes which assures the identity of a user in an extensible manner set for identity and access administration. Featuring coverage on a broad range of topics, such as biometric application programming interfaces, telecommunication security, and role-based access control, this book is geared towards academicians, practitioners, and researchers seeking current research on identity and access management.

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security

Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
Author: Gupta, Brij
Publisher: IGI Global
Total Pages: 616
Release: 2016-05-16
Genre: Computers
ISBN: 1522501061

Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments. The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.

Handbook of Research on Threat Detection and Countermeasures in Network Security

Handbook of Research on Threat Detection and Countermeasures in Network Security
Author: Al-Hamami, Alaa Hussein
Publisher: IGI Global
Total Pages: 450
Release: 2014-10-31
Genre: Computers
ISBN: 146666584X

Cyber attacks are rapidly becoming one of the most prevalent issues in the world. As cyber crime continues to escalate, it is imperative to explore new approaches and technologies that help ensure the security of the online community. The Handbook of Research on Threat Detection and Countermeasures in Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts, and technology specialists interested in the simulation and application of computer network protection.

Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing
Author: Munir, Kashif
Publisher: IGI Global
Total Pages: 266
Release: 2016-08-01
Genre: Computers
ISBN: 1522506039

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.

Handbook of Research on Natural Computing for Optimization Problems

Handbook of Research on Natural Computing for Optimization Problems
Author: Mandal, Jyotsna Kumar
Publisher: IGI Global
Total Pages: 1199
Release: 2016-05-25
Genre: Computers
ISBN: 1522500596

Nature-inspired computation is an interdisciplinary topic area that connects the natural sciences to computer science. Since natural computing is utilized in a variety of disciplines, it is imperative to research its capabilities in solving optimization issues. The Handbook of Research on Natural Computing for Optimization Problems discusses nascent optimization procedures in nature-inspired computation and the innovative tools and techniques being utilized in the field. Highlighting empirical research and best practices concerning various optimization issues, this publication is a comprehensive reference for researchers, academicians, students, scientists, and technology developers interested in a multidisciplinary perspective on natural computational systems.

A Deep Dive into NoSQL Databases: The Use Cases and Applications

A Deep Dive into NoSQL Databases: The Use Cases and Applications
Author:
Publisher: Academic Press
Total Pages: 402
Release: 2018-04-20
Genre: Computers
ISBN: 0128137878

A Deep Dive into NoSQL Databases: The Use Cases and Applications, Volume 109, the latest release in the Advances in Computers series first published in 1960, presents detailed coverage of innovations in computer hardware, software, theory, design and applications. In addition, it provides contributors with a medium in which they can explore their subjects in greater depth and breadth. This update includes sections on NoSQL and NewSQL databases for big data analytics and distributed computing, NewSQL databases and scalable in-memory analytics, NoSQL web crawler application, NoSQL Security, a Comparative Study of different In-Memory (No/New)SQL Databases, NoSQL Hands On-4 NoSQLs, the Hadoop Ecosystem, and more. - Provides a very comprehensive, yet compact, book on the popular domain of NoSQL databases for IT professionals, practitioners and professors - Articulates and accentuates big data analytics and how it gets simplified and streamlined by NoSQL database systems - Sets a stimulating foundation with all the relevant details for NoSQL database researchers, developers and administrators

Handbook of Research on Intrusion Detection Systems

Handbook of Research on Intrusion Detection Systems
Author: Gupta, Brij B.
Publisher: IGI Global
Total Pages: 407
Release: 2020-02-07
Genre: Computers
ISBN: 1799822435

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.