Improving Information Security Practices through Computational Intelligence

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Improving Information Security Practices through Computational Intelligence by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466694286
Publisher: IGI Global Publication: August 26, 2015
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466694286
Publisher: IGI Global
Publication: August 26, 2015
Imprint: Information Science Reference
Language: English

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

More books from IGI Global

Cover of the book Challenges of Academic Library Management in Developing Countries by
Cover of the book Memory, Identity, and Nationalism in European Regions by
Cover of the book Data Science and Simulation in Transportation Research by
Cover of the book Civil and Environmental Engineering by
Cover of the book Fashion and Textiles by
Cover of the book Assessing Social Support and Stress in Autism-Focused Virtual Communities by
Cover of the book Citizen E-Participation in Urban Governance by
Cover of the book Innovative Techniques and Applications of Entity Resolution by
Cover of the book Sociological and Philosophical Aspects of Human Interaction with Technology by
Cover of the book Web-Based Behavioral Therapies for Mental Disorders by
Cover of the book Capturing, Analyzing, and Managing Word-of-Mouth in the Digital Marketplace by
Cover of the book Applying the Actor-Network Theory in Media Studies by
Cover of the book Transforming K-12 Classrooms with Digital Technology by
Cover of the book Data Mining and Analysis in the Engineering Field by
Cover of the book Inter-Organizational Information Systems and Business Management by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy