Theory and Practice of Cryptography Solutions for Secure Information Systems

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Theory and Practice of Cryptography Solutions for Secure Information Systems by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466640337
Publisher: IGI Global Publication: May 31, 2013
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466640337
Publisher: IGI Global
Publication: May 31, 2013
Imprint: Information Science Reference
Language: English
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

More books from IGI Global

Cover of the book Materials Science and Engineering by
Cover of the book Media in the Ubiquitous Era by
Cover of the book Critical Research on Sexism and Racism in STEM Fields by
Cover of the book Emerging Communication Technologies for E-Health and Medicine by
Cover of the book Collaborative and Distributed E-Research by
Cover of the book Methods and Algorithms for Molecular Docking-Based Drug Design and Discovery by
Cover of the book Business Intelligence and Agile Methodologies for Knowledge-Based Organizations by
Cover of the book Microbial Cultures and Enzymes in Dairy Technology by
Cover of the book Improving K-12 STEM Education Outcomes through Technological Integration by
Cover of the book Handbook of Research on Engaging Immigrant Families and Promoting Academic Success for English Language Learners by
Cover of the book Handbook of Research on Solar Energy Systems and Technologies by
Cover of the book Teaching and Learning in 3D Immersive Worlds by
Cover of the book Management Science, Logistics, and Operations Research by
Cover of the book Computer Vision for Multimedia Applications by
Cover of the book Remote Work and Collaboration by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy