Applied cryptography for cyber security and defense information encryption and cyphering

"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publishe...

Full description

Bibliographic Details
Other Authors: Nemati, Hamid R. 1958-, Yang, Li 1974 October 29-
Format: Book
Published: Hershey, PA Information Science Reference, c2011
Subjects:
Online Access:View fulltext via EzAccess
LEADER 01411cam a2200301 a 4500
001 25654
003 DLC
005 20130606081841.0
008 100105s2011 paua b 001 0 eng
010 # # |a 2009052433 
020 # # |a 9781615207831 (hardcover) 
020 # # |a 9781615207848 (ebook) 
040 # # |a DLC  |c DLC  |d DLC 
042 # # |a pcc 
050 # # |a TK5102.94  |b .A67 2011 
082 # # |a 005.8/2  |2 22 
245 # # |a Applied cryptography for cyber security and defense  |b information encryption and cyphering  |c Hamid R. Nemati and Li Yang, editors 
260 # # |a Hershey, PA  |b Information Science Reference,  |c c2011 
300 # # |a xxii, 383 p.  |b ill.  |c 29 cm 
504 # # |a Includes bibliographical references (p. 338-366) and index 
520 # # |a "This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publisher. 
650 # # |a Telecommunication  |x Security measures 
650 # # |a Data encryption (Computer science) 
650 # # |a Cryptography 
700 # # |a Nemati, Hamid R.  |d 1958- 
700 # # |a Yang, Li  |d 1974 October 29- 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61520-783-1  |z View fulltext via EzAccess