Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering

Hamid R. Nemati (The University of North Carolina at Greensboro, USA) and Li Yang (University of Tennessee, USA)
Indexed In: SCOPUS
Release Date: August, 2010|Copyright: © 2011 |Pages: 408
DOI: 10.4018/978-1-61520-783-1
ISBN13: 9781615207831|ISBN10: 161520783X|EISBN13: 9781615207848
Hardcover:
Available
$180.00
TOTAL SAVINGS: $180.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$162.00
List Price: $180.00
10% Discount:-$18.00
TOTAL SAVINGS: $18.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace.

Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses’ information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Applied Cryptography
  • Biometric Security
  • Cryptography-based Authentication
  • E-Commerce
  • E-mail Services and Web Services
  • Network security
  • Pervasive Computing Environments
  • Secure Electronic Voting
  • Steganography
  • Wireless Sensor Networks
Indices
Table of Contents
Search this Book:
Reset
Editor Biographies
Dr. Hamid Nemati is an Associate Professor of Information Systems at the Information Systems and Operations Management Department of The University of North Carolina at Greensboro. He holds a doctorate from the University of Georgia and a Master of Business Administration from The University of Massachusetts. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. He also has extensive professional experience as a consultant with a number of major corporations. Dr. Nemati is the Editor-in-Chief of International Journal of Information Security and Privacy and the Advances in Information Security and Privacy (AISP) Book Series. His research specialization is in the areas of decision support systems, data warehousing and mining, and information security and privacy. His research articles have appeared in a number of premier journals. He has presented numerous research and scholarly papers nationally and internationally.
Dr. Li Yang is an Associate Professor in the Department of Computer Science and Engineering at the University of Tennessee at Chattanooga. She received her Ph.D. Florida International University and joined University of Tennessee at Chattanooga in 2005. Her research interests include network and information security, databases, and engineering techniques for complex software system design. She actively involves students into her research. She authored papers on these areas in refereed journal, conferences and symposiums. She received research awards from College of Engineering in the University of Tennessee at Chattanooga in 2007. She is a member of the ACM and IEEE. Currently she concentrates her teaching in Information Security, database security, and Computer Networks.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.