Improving Information Security Practices through Computational Intelligence

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Improving Information Security Practices through Computational Intelligence by , IGI Global
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9781466694286
Publisher: IGI Global Publication: August 26, 2015
Imprint: Information Science Reference Language: English
Author:
ISBN: 9781466694286
Publisher: IGI Global
Publication: August 26, 2015
Imprint: Information Science Reference
Language: English

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.

More books from IGI Global

Cover of the book Intelligent Applications for Heterogeneous System Modeling and Design by
Cover of the book Mechanical Properties of Natural Fiber Reinforced Polymers by
Cover of the book Handbook of Research on Information Architecture and Management in Modern Organizations by
Cover of the book Distance Education Environments and Emerging Software Systems by
Cover of the book Simulation and Gaming for Mathematical Education by
Cover of the book Handbook of Research on Driving STEM Learning With Educational Technologies by
Cover of the book Applied Case Studies and Solutions in Molecular Docking-Based Drug Design by
Cover of the book Modern Societal Impacts of the Model Minority Stereotype by
Cover of the book Investigating Cyber Law and Cyber Ethics by
Cover of the book Cybersecurity Education for Awareness and Compliance by
Cover of the book Sustainability Integration for Effective Project Management by
Cover of the book Collaboration and the Semantic Web by
Cover of the book Transdisciplinary Marketing Concepts and Emergent Methods for Virtual Environments by
Cover of the book Teaching and Learning in 3D Immersive Worlds by
Cover of the book Continuous Authentication Using Biometrics by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy