Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Indexed In: SCOPUS
Release Date: August, 2010|Copyright: © 2011 |Pages: 408
DOI: 10.4018/978-1-61520-783-1
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses’ information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Applied Cryptography
  • Biometric Security
  • Cryptography-based Authentication
  • E-Commerce
  • E-mail Services and Web Services
  • Network Security
  • Pervasive Computing Environments
  • Secure Electronic Voting
  • Steganography
  • Wireless Sensor Networks
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Dr. Hamid Nemati is an Associate Professor of Information Systems at the Information Systems and Operations Management Department of The University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from The University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He also has extensive professional experience as a consultant with a number of major corporations. Dr. Nemati is the Editor-in-Chief of International Journal of Information Security and Privacy and the Advances in Information Security and Privacy (AISP) Book Series. His research specialization is in the areas of decision support systems, data warehousing and mining, and information security and privacy. His research articles have appeared in a number of premier journals. He has presented numerous research and scholarly papers nationally and internationally.
Dr. Li Yang is an Associate Professor in the Department of Computer Science and Engineering at the University of Tennessee at Chattanooga. She received her Ph.D. Florida International University and joined University of Tennessee at Chattanooga in 2005. Her research interests include network and information security, databases, and engineering techniques for complex software system design. She actively involves students into her research. She authored papers on these areas in refereed journal, conferences and symposiums. She received research awards from College of Engineering in the University of Tennessee at Chattanooga in 2007. She is a member of the ACM and IEEE. Currently she concentrates her teaching in Information Security, database security, and Computer Networks.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.