Security and Privacy Management, Techniques, and Protocols

Security and Privacy Management, Techniques, and Protocols

Indexed In: SCOPUS
Release Date: April, 2018|Copyright: © 2018 |Pages: 426
DOI: 10.4018/978-1-5225-5583-4
ISBN13: 9781522555834|ISBN10: 1522555838|EISBN13: 9781522555841
Hardcover:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$205.00
TOTAL SAVINGS: $205.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$245.00
TOTAL SAVINGS: $245.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$800.00
TOTAL SAVINGS: $800.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures.

Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Cryptography
  • Data Mining
  • Intrusion Detection System
  • Risk Monitoring
  • Secure Routing Protocols
  • Security Visualization
  • Wireless Security
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Yassine Maleh is from Morocco. He is a PhD of the University Hassan 1st in Settat Morocco, since 2016. He received his Master degree (2012) in Network and IT Security from Faculty of Science and Technology Settat, Morocco, and his Bachelor in Networks and IT Systems (2009) from Hassan 1st University Morocco. He is IT Project Manager at the National Port Agency in Morocco. He is Member of IEEE Communications Society and European Microwave Association. and International Association of Engineers IAENG. His research interests include Wireless Sensor Networks, Virtual Laboratory, Internet of Things, and Networks Security. He has served and continues to serve on the executive and technical program committees of numerous international conference and journals such as International Journal of Networks Security and International Journal of Sensor Networks and Data Communications.
Abstracting & Indexing
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.