Indices1
Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

Copyright: © 2014 |Pages: 427
ISBN13: 9781466645141|ISBN10: 1466645148|EISBN13: 9781466645158
DOI: 10.4018/978-1-4666-4514-1
Cite Book Cite Book

MLA

Ruiz-Martinez, Antonio, et al., editors. Architectures and Protocols for Secure Information Technology Infrastructures. IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4514-1

APA

Ruiz-Martinez, A., Marin-Lopez, R., & Pereniguez-Garcia, F. (Eds.). (2014). Architectures and Protocols for Secure Information Technology Infrastructures. IGI Global. https://doi.org/10.4018/978-1-4666-4514-1

Chicago

Ruiz-Martinez, Antonio, Rafael Marin-Lopez, and Fernando Pereniguez-Garcia, eds. Architectures and Protocols for Secure Information Technology Infrastructures. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4514-1

Export Reference

Mendeley
Favorite Full-Book Download

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers.

Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for researchers, engineers, and professionals interested in exploring recent advances in ICT security.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
State-of-the-Art  (pages 21-22)
State-of-the-Art
This content has been removed at the discretion of the publisher and the editors.
Cryptographic Algorithms and Security Protocols
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Malware and Intrusion Detection Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Secure Platforms and Frameworks
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.