Security and Privacy Management, Techniques, and Protocols

Security and Privacy Management, Techniques, and Protocols
Author :
Publisher : IGI Global
Total Pages : 448
Release :
ISBN-10 : 9781522555841
ISBN-13 : 1522555846
Rating : 4/5 (41 Downloads)

Book Synopsis Security and Privacy Management, Techniques, and Protocols by : Maleh, Yassine

Download or read book Security and Privacy Management, Techniques, and Protocols written by Maleh, Yassine and published by IGI Global. This book was released on 2018-04-06 with total page 448 pages. Available in PDF, EPUB and Kindle. Book excerpt: The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.


Security and Privacy Management, Techniques, and Protocols Related Books

Security and Privacy Management, Techniques, and Protocols
Language: en
Pages: 448
Authors: Maleh, Yassine
Categories: Computers
Type: BOOK - Published: 2018-04-06 - Publisher: IGI Global

DOWNLOAD EBOOK

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain i
Modern Principles, Practices, and Algorithms for Cloud Security
Language: en
Pages: 361
Authors: Gupta, Brij B.
Categories: Computers
Type: BOOK - Published: 2019-09-27 - Publisher: IGI Global

DOWNLOAD EBOOK

In today’s modern age of information, new technologies are quickly emerging and being deployed into the field of information technology. Cloud computing is a
Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-World Applications for Enhancing Security, Privacy, and Scalability in Modern Digital Infrastructures
Language: en
Pages: 182
Authors: Mahammad Shaik
Categories: Computers
Type: BOOK - Published: 2022-03-10 - Publisher: Libertatem Media Private Limited

DOWNLOAD EBOOK

This comprehensive monograph delves into the integration of Identity Access Management (IAM) and Blockchain technologies, offering advanced techniques and metho
Effective Model-Based Systems Engineering
Language: en
Pages: 788
Authors: John M. Borky
Categories: Technology & Engineering
Type: BOOK - Published: 2018-09-08 - Publisher: Springer

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise p
Guide to Computer Security Log Management
Language: en
Pages: 72
Authors: Karen Kent
Categories:
Type: BOOK - Published: 2007-08-01 - Publisher:

DOWNLOAD EBOOK

A log is a record of the events occurring within an org¿s. systems & networks. Many logs within an org. contain records related to computer security (CS). Thes