Applied cryptography for cyber security and defense : information encryption and cyphering /

"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publishe...

Full description

Bibliographic Details
Main Authors: Nemati, Hamid R., 1958-, Yang, Li, 1974 Oct. 29-
Format:
Language:eng
Published: Hershey, PA : Information Science Reference, 2011
Subjects:
_version_ 1826443191202611200
author Nemati, Hamid R., 1958-
Yang, Li, 1974 Oct. 29-
author_facet Nemati, Hamid R., 1958-
Yang, Li, 1974 Oct. 29-
author_sort Nemati, Hamid R., 1958-
collection OCEAN
description "This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.
first_indexed 2024-03-05T10:09:50Z
format
id KOHA-OAI-TEST:433372
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T10:09:50Z
publishDate 2011
publisher Hershey, PA : Information Science Reference,
record_format dspace
spelling KOHA-OAI-TEST:4333722020-12-19T17:15:32ZApplied cryptography for cyber security and defense : information encryption and cyphering / Nemati, Hamid R., 1958- Yang, Li, 1974 Oct. 29- Hershey, PA : Information Science Reference,2011eng"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.Includes bibliographical references (p. 338-366) and index."This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.PSZJBLTelecommunicationData encryption (Computer science)Cryptography.URN:ISBN:9781615207831 (hardcover)URN:ISBN:9781615207848 (ebook)
spellingShingle Telecommunication
Data encryption (Computer science)
Cryptography.
Nemati, Hamid R., 1958-
Yang, Li, 1974 Oct. 29-
Applied cryptography for cyber security and defense : information encryption and cyphering /
title Applied cryptography for cyber security and defense : information encryption and cyphering /
title_full Applied cryptography for cyber security and defense : information encryption and cyphering /
title_fullStr Applied cryptography for cyber security and defense : information encryption and cyphering /
title_full_unstemmed Applied cryptography for cyber security and defense : information encryption and cyphering /
title_short Applied cryptography for cyber security and defense : information encryption and cyphering /
title_sort applied cryptography for cyber security and defense information encryption and cyphering
topic Telecommunication
Data encryption (Computer science)
Cryptography.
work_keys_str_mv AT nematihamidr1958 appliedcryptographyforcybersecurityanddefenseinformationencryptionandcyphering
AT yangli1974oct29 appliedcryptographyforcybersecurityanddefenseinformationencryptionandcyphering