Improving information security practices through computational intelligence
This book presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to those working in computational intelligence, information security, and security engineering
Saved in:
| Other Authors: | Awad, Wasan Shaker 1969- (Editor), El-Alfy, El Sayed M. 1968- (Editor), Al-Bastaki, Yousif A. Latif (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Hershey, PA
Information Science Reference, an imprint of IGI Global
[2016]
|
| Series: | A volume on Advances in information security, privacy, and ethics (AISPE) book series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computational intelligence a dynamic system perspective
Published: (1995)
Published: (1995)
Computational intelligence
Published: (2013)
Published: (2013)
Computational intelligence and its applications evolutionary computation, fuzzy logic, neural network and support vector machine techniques
Published: (2012)
Published: (2012)
System Analysis and Artificial Intelligence /
Published: (2023)
Published: (2023)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Principles of information security
by: Whitman, Michael E
Published: (2003)
by: Whitman, Michael E
Published: (2003)
Simple computer security disinfect your PC
Published: (2007)
Published: (2007)
Information security governance
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
by: Von Solms, Sebastiaan H., et al.
Published: (2009)
IT governance and information security guides, standards, and frameworks
by: Maleh, Yassine, et al.
Published: (2022)
by: Maleh, Yassine, et al.
Published: (2022)
Management of information security
by: Whitman
Published: (2004)
by: Whitman
Published: (2004)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
Information security governance and management framework model and toolset for CISOs and decision makers
by: Volchkov, Andrej
Published: (2019)
by: Volchkov, Andrej
Published: (2019)
Information security policies, procedures, and standards a practitioner's reference
by: Landoll, Douglas J.
Published: (2016)
by: Landoll, Douglas J.
Published: (2016)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
DETERMINING CRITICAL SUCCESS FACTORS OF INFORMATION SECURITY KNOWLEDGE TOWARDS ORGANISATIONS' INFORMATION SECURITY EFFECTIVENESS : /
by: Rohana Mohamad Rashid
Published: (2020)
by: Rohana Mohamad Rashid
Published: (2020)
Information protection playbook
Published: (2013)
Published: (2013)
Firewalls don't stop dragons a step-by-step guide to computer security for non-techies
by: Parker, Carey
Published: (2018)
by: Parker, Carey
Published: (2018)
Information hiding techniques for steganography and digital watermarking
by: lh
by: lh
Computer and intrusion forensics
Published: (2003)
Published: (2003)
An investigation into the impact of a cyber exercise in Malaysia
by: Arniyati Ahmad
Published: (2020)
by: Arniyati Ahmad
Published: (2020)
Data hiding exposing concealed data in multimedia, operating systems, mobile devices and network protocols
by: Raggo, Michael T.
Published: (2013)
by: Raggo, Michael T.
Published: (2013)
Information security management global challenges in 21st century
by: Goel, Suresh
Published: (2009)
by: Goel, Suresh
Published: (2009)
Advances in enterprise information technology security
Published: (2007)
Published: (2007)
Security in computing
by: Pfleeger lhCharles P.
by: Pfleeger lhCharles P.
Applied computational intelligence and soft computing in engineering
Published: (2018)
Published: (2018)
Computational intelligence a compendium
Published: (2008)
Published: (2008)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
Cloud storage security a practical guide
by: Wheeler, Aaron, et al.
Published: (2015)
by: Wheeler, Aaron, et al.
Published: (2015)
Computational intelligence in archaeology
by: Barcelo, Juan A.
Published: (2009)
by: Barcelo, Juan A.
Published: (2009)
Computational intelligence in archaeology
by: Barcelo
Published: (2009)
by: Barcelo
Published: (2009)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Advances in computational intelligence theory and applications
Published: (2006)
Published: (2006)
Similar Items
-
Computational intelligence a dynamic system perspective
Published: (1995) -
Computational intelligence
Published: (2013) -
Computational intelligence and its applications evolutionary computation, fuzzy logic, neural network and support vector machine techniques
Published: (2012) -
System Analysis and Artificial Intelligence /
Published: (2023) -
Security in computing
by: Pfleegar, Charles P.
Published: (1997)


