Handbook of research on modern cryptographic solutions for computer and cyber security
This book identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention, featuring theoretical perspectives, best practices, and future research directions.
Saved in:
| Other Authors: | Gupta, Brij (Editor), Agrawal, Dharma P. (Editor), Yamaguchi, Shingo (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
IGI Global
2016
|
| Series: | Advances in information security, privacy, and ethics (AISPE)
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptographic solutions for secure online banking and commerce
Published: (2016)
Published: (2016)
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Handbook of research on generalized and hybrid set structures and applications for soft computing
Published: (2016)
Published: (2016)
Great papers in computer science
Published: (1996)
Published: (1996)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Managing cyber threats
Published: (2015)
Published: (2015)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Cyber security enforcement in military impact towards national security
by: Mohamed Zaid Mohamed Tazali
by: Mohamed Zaid Mohamed Tazali
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Handbook of research on civil society and national security in the era of cyber warfare
Published: (2016)
Published: (2016)
The dictionary of standard C
by: Jaeschke, Rex
Published: (2001)
by: Jaeschke, Rex
Published: (2001)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Cyber defence a critical capabilities for Malaysia national security
by: Ahmad Saifolnizam Aznan
by: Ahmad Saifolnizam Aznan
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Developments in information security and cybernetic wars
Published: (2019)
Published: (2019)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
Applying methods of scientific inquiry into intelligence, security, and counterterrorism
Published: (2019)
Published: (2019)
Cisco certification bridges, routers and switches for CCIEs
by: Caslow, Andrew Bruce
Published: (1998)
by: Caslow, Andrew Bruce
Published: (1998)
Handbook of research on machine and deep learning applications for cyber security
Published: (2020)
Published: (2020)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
National Cyber Security Policy enhancing the cooperation between public and private agencies
by: Fairuzeyaza Yahaya
Published: (2019)
by: Fairuzeyaza Yahaya
Published: (2019)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Security and privacy in social networks
Published: (2013)
Published: (2013)
A history of cyber security attacks 1980 to present
by: Middleton, Bruce
Published: (2017)
by: Middleton, Bruce
Published: (2017)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Emerging trends in ICT security
Published: (2014)
Published: (2014)
Cyber security economic strategies and public policy alternatives
by: Gallaher, Michael P.
Published: (2008)
by: Gallaher, Michael P.
Published: (2008)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Similar Items
-
Cryptographic solutions for secure online banking and commerce
Published: (2016) -
Cyber security and IT infrastructure protection
Published: (2014) -
Security solutions for hyperconnectivity and the Internet of things
Published: (2017) -
Cyber insecurity navigating the perils of the next information age
Published: (2016) -
Handbook of research on generalized and hybrid set structures and applications for soft computing
Published: (2016)


