9781615207831-161520783X-Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

ISBN-13: 9781615207831
ISBN-10: 161520783X
Edition: 1
Author: Hamid R. Nemati, Li Yang
Publication date: 2010
Publisher: Information Science Reference
Format: Hardcover 408 pages
FREE US shipping
Buy

From $180.00

Book details

ISBN-13: 9781615207831
ISBN-10: 161520783X
Edition: 1
Author: Hamid R. Nemati, Li Yang
Publication date: 2010
Publisher: Information Science Reference
Format: Hardcover 408 pages

Summary

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (ISBN-13: 9781615207831 and ISBN-10: 161520783X), written by authors Hamid R. Nemati, Li Yang, was published by Information Science Reference in 2010. With an overall rating of 4.1 stars, it's a notable title among other Computer Science (Internet, Groupware, & Telecommunications, Networking & Cloud Computing, Network Security, Security & Encryption, Internet & Social Media, Privacy & Online Safety) books. You can easily purchase or rent Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering (Hardcover) from BooksRun, along with many other new and used Computer Science books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

In today's information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book