Reference Hub4
Indices1
Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems

Copyright: © 2020 |Pages: 434
ISBN13: 9781799812906|ISBN10: 1799812901|EISBN13: 9781799812920
DOI: 10.4018/978-1-7998-1290-6
Cite Book Cite Book

MLA

Bilan, Stepan Mykolayovych, and Saleem Issa Al-Zoubi, editors. Handbook of Research on Intelligent Data Processing and Information Security Systems. IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1290-6

APA

Bilan, S. M. & Al-Zoubi, S. I. (Eds.). (2020). Handbook of Research on Intelligent Data Processing and Information Security Systems. IGI Global. https://doi.org/10.4018/978-1-7998-1290-6

Chicago

Bilan, Stepan Mykolayovych, and Saleem Issa Al-Zoubi, eds. Handbook of Research on Intelligent Data Processing and Information Security Systems. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-1290-6

Export Reference

Mendeley
Favorite Full-Book Download

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research.

The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Information Security  (pages 24-24)
This section contains chapters devoted to research in the field of information security. The issues of analysis of attacks on information systems and on biometric identification systems are considered. Several chapters are devoted to...
Information Security
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
The chapters that describe research in the field of specific practical applications of modern methods of intelligent data processing and information security in industry and in various specific areas of human activity (banks, space...
Intellectual Data Processing and Information Security in Various Aspects of Human Activity
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
This section contains chapters that describe new research in image processing and recognition. For this purpose, the parallel shift technology, cellular automata and retinal simulation tools are used.
Image Processing and Recognition
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.