"This book explores techniques and technologies used to secure data and prevent intrusion in virtual environments, providing meaningful research on intrusion detection and authentication techniques in
Nemati (U. of North Carolina-Greensboro) gathers international contributors in electrical engineering, computer science, information systems, telecom technology, and project management, in order to ex
Academics and professionals in the fields of computer science and informatics present twenty-three papers on contemporary issues in information and data security and privacy in networking technologies
Successfully competing in the new global economy requires immediate decision capability. This immediate decision capability requires quick analysis of both timely and relevant data. To support this an
"This book is written for professionals who want to improve their understanding about how to bridge the gap between cryptographic theory and real-world cryptographic applications and how to adapt cryp