Edition |
1st ed. |
Description |
1 online resource (xii, 355 pages) : color illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Bibliography |
Includes bibliographical references and indexes. |
Note |
Print version record. |
Summary |
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science. |
Contents |
Front Cover -- Computers -- Copyright -- Contents -- Preface -- Chapter 1: The State of the Art in Identity Theft -- 1. Introduction -- 2. What Sets Identity Theft Apart from Other Crimes -- 3. Statistical Data for Identity Theft and Associated Crimes -- 4. The Genesis of the Problem -- 5. How SSN Became the De Facto Primary Key for Most Databases -- 6. The Ubiquitous Use of Fungible Credentials -- 7. Phishing -- 8. Modus Operandi -- 9. Inadequate Credential Management Procedures -- 10. Strategies for Defeating Identity Thieves -- 11. Conclusion -- References -- Chapter 2: An Overview of Steganography -- 1. Introduction |
|
2. Low-Tech Stego Methods -- 3. Digital Technology Basics -- 4. Steganography and Digital Carrier Files -- 5. Detecting Steganography -- 6. Steganography Detection Tools -- 7. Summary and Conclusions -- Appendix A. Additional Web Sites -- Appendix B. Companion Downloads to this Chapter -- References -- Chapter 3: Captchas: An Artificial Intelligence Application to Web Security -- 1. Introduction -- 2. Motivation and Applications -- 3. Types of CAPTCHAs -- 4. Evaluation of CAPTCHAs -- 5. Security and Attacks on CAPTCHAs -- 6. Alternatives to CAPTCHAs -- 7. Conclusions and Future Trends -- References |
|
Chapter 4: Advances in Video-Based Biometrics -- 1. Introduction -- 2. Video-Based Face Recognition -- 3. Video-Based Identification Using Gait -- 4. Conclusions -- Acknowledgments -- References -- Chapter 5: Action Research Can Swing the Balance in Experimental Software Engineering -- 1. Introduction -- 2. Action Research Overview -- 3. The Use of Action Research in Software Engineering: A Preliminary Survey? -- 4. Using Action Research in Software Engineering: An In Vivo Study -- 5. Applying Action Research to Software Engineering -- 6. Final Considerations -- Acknowledgments -- References |
|
Chapter 6: Functional and Nonfunctional Design Verification for Embedded Software Systems -- 1. Introduction -- 2. Background -- 3. Instrumentation-based Verification -- 4. Quality Attribute-Based Reasoning -- 5. Integrated Functional and Nonfunctional Verification -- 6. Tool Support -- 7. Conclusion -- References -- Author Index -- Subject Index -- Contents of Volumes in This Series |
Subject |
Computer security.
|
|
World Wide Web -- Security measures.
|
|
Computer Security |
|
Sécurité informatique.
|
|
Web -- Sécurité -- Mesures.
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer security
|
|
World Wide Web -- Security measures
|
Added Author |
Zelkowitz, Marvin V., 1945-
|
Other Form: |
Print version: Security on the Web. Academic Pr 2011 9780123855107 (OCoLC)713189598 |
ISBN |
9780123855114 (electronic bk.) |
|
012385511X (electronic bk.) |
|
9780123855107 (electronic bk.) |
|
0123855101 (electronic bk.) |
Standard No. |
DEBSZ 405337159 |
|