Advances in Computers: Information Security
The series covers new developments in computer technology. Most chapters present an overview of a current subfield within computers, with many citations, and often include new developments in the field by the authors of the individual chapters. Topics include hardware, software, theoretical underpinnings of computing, and novel applications of computers. This current volume emphasizes information security issues and includes topics like certifying computer professionals, non-invasive attacks ("cognitive hacking"), computer files as legal evidence ("computer forensics") and the use of processors on plastic ("smartcards").
The book series is a valuable addition to university courses that emphasize the topics under discussion in that particular volume as well as belonging on the bookshelf of industrial practitioners who need to implement many of the technologies that are described.
· In-depth surveys and tutorials on new computer technology
· Well-known authors and researchers in the field
· Extensive bibliographies with most chapters
· Five out of seven chapters focus on security issues
· Discussion of computer forensics, professional certification and smart cards
· A chapter on how DNA sequencing is accomplished is important in the growing bioinformatics field.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter 2 Cognitive Hacking
An Introduction to Digital Forensics
Synergizing Security and Reliability
Chapter 5 Smart Cards
Chapter 6 Shotgun Sequence Assembly
Other editions - View all
access control accredited acoustic model alignment analysis applications approach assembly algorithms attacks BACs body of knowledge Campus ID Report cardholder certiﬁcation chip cognitive hacking Computer Science computer security consensus contactless smart cards contain contigs DARPA decoding deﬁned deﬁnition device difﬁcult digital evidence digital forensics discussed disk DNA sequence efﬁcient electronic encryption error rate examination example ﬁeld ﬁle ﬁnal ﬁnancial ﬁnd ﬁnishing ﬁrst fragments Gaussian Genome Res graph hash human genome identiﬁcation identify IEEE Immunix Internet intrusion detection issues k-mers language model licensing of software magnetic stripe mandatory access controls mapping mate-pair multiple N-gram OODA loop overlap physical problem random reader reads reliability repeats scaffolds scientiﬁc Section sequence assembly sequencing errors shotgun sequencing signiﬁcant speciﬁc speech recognition standard string sufﬁcient sufﬁx SWEBOK techniques tion transaction Vicinity Cards website defacement word
Page 10 - Clarify the place — and set the boundary — of software engineering with respect to other disciplines such as computer science, project management, computer engineering, and mathematics.