Applied cryptography for cyber security and defense information encryption and cyphering

"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publishe...

Full description

Bibliographic Details
Other Authors: Nemati, Hamid R. 1958-, Yang, Li 1974 October 29-
Format: Book
Published: Hershey, PA Information Science Reference, c2011
Subjects:
Online Access:View fulltext via EzAccess