Reference Hub11
Indices1
Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Copyright: © 2011 |Pages: 408
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
DOI: 10.4018/978-1-61520-783-1
Cite Book Cite Book

MLA

Nemati, Hamid R., and Li Yang, editors. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1

APA

Nemati, H. R. & Yang, L. (Eds.). (2011). Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. IGI Global. https://doi.org/10.4018/978-1-61520-783-1

Chicago

Nemati, Hamid R., and Li Yang, eds. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-783-1

Export Reference

Mendeley
Favorite Full-Book Download

In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses’ information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Cryptography in Networking and Cyber Space
This content has been removed at the discretion of the publisher and the editors.
Cryptography in E-Mail and Web Services
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Cryptography in Wireless Communication
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Cryptography in Electronic Commerce
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Cryptography in Emerging Areas
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.