Security and Privacy Management, Techniques, and Protocols

Security and Privacy Management, Techniques, and Protocols

Yassine Maleh (University Hassan I, Morocco)
Indexed In: SCOPUS
Release Date: April, 2018|Copyright: © 2018 |Pages: 426
DOI: 10.4018/978-1-5225-5583-4
ISBN13: 9781522555834|ISBN10: 1522555838|EISBN13: 9781522555841
Hardcover:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$184.50
List Price: $205.00
10% Discount:-$20.50
TOTAL SAVINGS: $20.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures.

Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cryptography
  • Data Mining
  • Intrusion Detection System
  • Risk Monitoring
  • Secure Routing Protocols
  • Security Visualization
  • Wireless Security
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Yassine Maleh is from Morocco. He is a PhD of the University Hassan 1st in Settat Morocco, since 2016. He received his Master degree (2012) in Network and IT Security from Faculty of Science and Technology Settat, Morocco, and his Bachelor in Networks and IT Systems (2009) from Hassan 1st University Morocco. He is IT Project Manager at the National Port Agency in Morocco. He is Member of IEEE Communications Society and European Microwave Association. and International Association of Engineers IAENG. His research interests include Wireless Sensor Networks, Virtual Laboratory, Internet of Things, and Networks Security. He has served and continues to serve on the executive and technical program committees of numerous international conference and journals such as International Journal of Networks Security and International Journal of Sensor Networks and Data Communications.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.