wyszukanych pozycji: 3
Mobile Device Data Security on Android
ISBN: 9783659801846 / Angielski / Miękka / 2015 / 80 str. Termin realizacji zamówienia: ok. 10-14 dni roboczych. Smart phones and other mobile devices are widely used in day to day life. One of the important feature of mobile devices is mobility, which exposes them to different threat environments and excludes them from relying on external physical security. So, the security requirements for mobile devices are different from stationary machines. The enterprises, government, and military uses various productive applications. Productive applications often deal with sensitive and secret data. A risk management and security framework is required to protect applications and data on mobile devices....
Smart phones and other mobile devices are widely used in day to day life. One of the important feature of mobile devices is mobility, which exposes th...
|
|
cena:
183,08 zł |
Multimodal Fusion of Iris and Fingerprint
ISBN: 9783848432431 / Angielski / Miękka / 2014 / 104 str. Termin realizacji zamówienia: ok. 10-14 dni roboczych. Biometrics systems perform authentication based on human body features, systems based on only one kind of biometric trait are generally called as unimodal biometric systems. The performance and scalability of a biometric system can be increased by combining more than one biometric trait. Such systems are called as multimodal biometric systems. Being less intrusive and universal fingerprint based systems serve as good option for access control and surveillance. Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes Fingerprint & Iris...
Biometrics systems perform authentication based on human body features, systems based on only one kind of biometric trait are generally called as unim...
|
|
cena:
251,91 zł |
Protecting Data Leakages in Cloud Computing
ISBN: 9783659762178 / Angielski / Miękka / 2015 / 64 str. Termin realizacji zamówienia: ok. 10-14 dni roboczych. Cloud computing has emerged as one of the enabling technologies that allows the world of Information Technology to use computer resources effectively and more efficiently. There is a growing trend of using cloud environments for storage and data processing needs. This book proposes a different approach for protecting data leakages in the cloud. In this book, various layers of security for data have been proposed which will provide highest security to data in cloud. These layers will consist of user authentication with one time password, user access rights, encryption of users data and in the...
Cloud computing has emerged as one of the enabling technologies that allows the world of Information Technology to use computer resources effectively ...
|
|
cena:
183,08 zł |