Reference Hub7
Indices1
Security and Privacy Management, Techniques, and Protocols

Security and Privacy Management, Techniques, and Protocols

Copyright: © 2018 |Pages: 426
ISBN13: 9781522555834|ISBN10: 1522555838|EISBN13: 9781522555841
DOI: 10.4018/978-1-5225-5583-4
Cite Book Cite Book

MLA

Maleh, Yassine, editor. Security and Privacy Management, Techniques, and Protocols. IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5583-4

APA

Maleh, Y. (Ed.). (2018). Security and Privacy Management, Techniques, and Protocols. IGI Global. https://doi.org/10.4018/978-1-5225-5583-4

Chicago

Maleh, Yassine, ed. Security and Privacy Management, Techniques, and Protocols. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5583-4

Export Reference

Mendeley
Favorite Full-Book Download

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures.

Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Security and Privacy Protocols and Cryptographic Algorithms
This content has been removed at the discretion of the publisher and the editors.
Security and Privacy Management and Methods
This content has been removed at the discretion of the publisher and the editors.
E-Health Security Management and Methodologies
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Intrusion Detection Systems
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Cyber Security and Malware
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.