Applied cryptography for cyber security and defense : information encryption and cyphering /
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publishe...
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Hershey, PA : Information Science Reference,
2011
|
Subjects: |
_version_ | 1826443191202611200 |
---|---|
author | Nemati, Hamid R., 1958- Yang, Li, 1974 Oct. 29- |
author_facet | Nemati, Hamid R., 1958- Yang, Li, 1974 Oct. 29- |
author_sort | Nemati, Hamid R., 1958- |
collection | OCEAN |
description | "This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher. |
first_indexed | 2024-03-05T10:09:50Z |
format | |
id | KOHA-OAI-TEST:433372 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T10:09:50Z |
publishDate | 2011 |
publisher | Hershey, PA : Information Science Reference, |
record_format | dspace |
spelling | KOHA-OAI-TEST:4333722020-12-19T17:15:32ZApplied cryptography for cyber security and defense : information encryption and cyphering / Nemati, Hamid R., 1958- Yang, Li, 1974 Oct. 29- Hershey, PA : Information Science Reference,2011eng"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.Includes bibliographical references (p. 338-366) and index."This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher.PSZJBLTelecommunicationData encryption (Computer science)Cryptography.URN:ISBN:9781615207831 (hardcover)URN:ISBN:9781615207848 (ebook) |
spellingShingle | Telecommunication Data encryption (Computer science) Cryptography. Nemati, Hamid R., 1958- Yang, Li, 1974 Oct. 29- Applied cryptography for cyber security and defense : information encryption and cyphering / |
title | Applied cryptography for cyber security and defense : information encryption and cyphering / |
title_full | Applied cryptography for cyber security and defense : information encryption and cyphering / |
title_fullStr | Applied cryptography for cyber security and defense : information encryption and cyphering / |
title_full_unstemmed | Applied cryptography for cyber security and defense : information encryption and cyphering / |
title_short | Applied cryptography for cyber security and defense : information encryption and cyphering / |
title_sort | applied cryptography for cyber security and defense information encryption and cyphering |
topic | Telecommunication Data encryption (Computer science) Cryptography. |
work_keys_str_mv | AT nematihamidr1958 appliedcryptographyforcybersecurityanddefenseinformationencryptionandcyphering AT yangli1974oct29 appliedcryptographyforcybersecurityanddefenseinformationencryptionandcyphering |