Applied cryptography for cyber security and defense information encryption and cyphering
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryptography solutions to emerging areas that have special requirements"--Provided by publishe...
Other Authors: | Nemati, Hamid R. 1958-, Yang, Li 1974 October 29- |
---|---|
Format: | Book |
Published: |
Hershey, PA
Information Science Reference,
c2011
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Similar Items
-
Internet of things for architects : architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security /
by: Lea, Perry,
Published: (2018) -
Practical mobile forensics : forensically investigate and analyze iOS, Android, and Windows 10 devices /
by: Tamma, Rohit,
Published: (2020) -
Cybersecurity fundamentals a real-world perspective /
by: Thakur, Kutub.
Published: (2020) -
Cryptography /
by: Rubinstein-Salzedo, Simon,
Published: (2018) -
Communication systems principles using MATLAB /
by: Leis, John W.,
Published: (2018)