Security and Privacy Management, Techniques, and Protocols

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Security and Privacy Management, Techniques, and Protocols by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781522555858
Publisher: IGI Global Publication: April 6, 2018
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781522555858
Publisher: IGI Global
Publication: April 6, 2018
Imprint: Information Science Reference
Language: English

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

More books from IGI Global

Cover of the book Business Strategy and Applications in Enterprise IT Governance by
Cover of the book Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance by
Cover of the book Probabilistic Nodes Combination (PNC) for Object Modeling and Contour Reconstruction by
Cover of the book Bridging the Gap Between Growth Theory and Policy in Asia by
Cover of the book Handbook of Research on Mobility and Computing by
Cover of the book Applications and Developments in Grid, Cloud, and High Performance Computing by
Cover of the book Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing by
Cover of the book Revolutionizing K-12 Blended Learning through the i²Flex Classroom Model by
Cover of the book Student Satisfaction and Learning Outcomes in E-Learning by
Cover of the book Building a Competitive Public Sector with Knowledge Management Strategy by
Cover of the book Applying Nanotechnology for Environmental Sustainability by
Cover of the book User-Driven Healthcare by
Cover of the book Research 2.0 and the Impact of Digital Technologies on Scholarly Inquiry by
Cover of the book Cultivating Diverse Online Classrooms Through Effective Instructional Design by
Cover of the book Handbook of Research on Social Entrepreneurship and Solidarity Economics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy