Improving Information Security Practices through Computational Intelligence

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Improving Information Security Practices through Computational Intelligence by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466694286
Publisher: IGI Global Publication: August 26, 2015
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466694286
Publisher: IGI Global
Publication: August 26, 2015
Imprint: Information Science Reference
Language: English

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

More books from IGI Global

Cover of the book Handbook of Research on Generalized and Hybrid Set Structures and Applications for Soft Computing by
Cover of the book Critical Practice in P-12 Education by
Cover of the book Pedagogical Applications and Social Effects of Mobile Technology Integration by
Cover of the book Innovations and Developments of Swarm Intelligence Applications by
Cover of the book Ensuring Research Integrity and the Ethical Management of Data by
Cover of the book Effects of IT on Enterprise Architecture, Governance, and Growth by
Cover of the book Cases on Teaching Critical Thinking through Visual Representation Strategies by
Cover of the book Handbook of Research on Effective Advertising Strategies in the Social Media Age by
Cover of the book Soft Computing Applications for Renewable Energy and Energy Efficiency by
Cover of the book Relief Supply Chain Management for Disasters by
Cover of the book Enterprise Resource Planning by
Cover of the book Rethinking Machine Ethics in the Age of Ubiquitous Technology by
Cover of the book Systems Research for Real-World Challenges by
Cover of the book Handbook of Research on Human-Computer Interfaces and New Modes of Interactivity by
Cover of the book Logistics and Transport Modeling in Urban Goods Movement by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy