The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols.
Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
"synopsis" may belong to another edition of this title.
Wasan Shaker Awad is an associate professor of Computer Science, College of Information Technology, Ahlia University, Bahrain. Her research areas include information security, computational intelligence, and coding theory. She published a number of papers in computational intelligence, information security, and block codes in a number of international journals and conferences.
El-Sayed M. El-Alfy is currently working at King Fahd University of Petroleum and Minerals, Saudi Arabia as Associate Professor & Intelligent Systems Research Group Coordinator. He is on leave from the College of Engineering, Tanta University. His research interests are pattern recognition and machine learning, computational intelligence and soft computing, data mining with applications in the areas of computer networks, document analysis, information retrieval, multimedia content security and forensics. Dr. El-Alfy has published numerously in these areas, attended several international conferences and contributed in the organization of many world-class international conferences as program chair, track chair, tutorial committee member, program committee member, session chair, and reviewer. He is a senior member of IEEE, member of ACM, IEEE CIS, IEEE CS, IEEE SMC, APNNA, INSTICC, MRLAB, ACS; member of technical committees of ADPRL, CISTC, and Multimedia Computing. He is also an associate editor of the IEEE Transactions on Neural Networks and Learning Systems, associate editor, International Journal on Trust Management in Computing and Communications, associate editor of the International Journal of Network Protocols and Algorithms, editor of the Journal of Emerging Technologies in Web Intelligence (JETWI), and editor of the International Journal of Advanced Science and Technology.
Dr. Yousif AL-Bastaki received a BSc. degree from University of Bahrain, Msc from University of Leeds, UK and a PhD degree from University of Nottingham, UK. Recently he has been appointed as an IT advisor at the Deputy Prime Minster at the Kingdom of Bahrain and previously worked as the Dean of College of IT at the University of Bahrain. Currently he is an associate professor and the Dean of Admission and Registration at the University of Bahrain. His research interests are Neural Networks, genetic algorithms E-Learning, Distance Education and e-government strategies and implementation.
It's a good reminder to look on the security side of information management as it represents current and future challenges for developers and end-users. The proposed algorithm in chapter 3 (GADS) was very clear and none of the articles I have read on similar subjects were as relevant as those presented in this title. --Ahmed Asad, Network Engineer, Bahrain
"About this title" may belong to another edition of this title.
US$ 33.53 shipping from United Kingdom to U.S.A.
Destination, rates & speedsSeller: Lucky's Textbooks, Dallas, TX, U.S.A.
Condition: New. Seller Inventory # ABLING22Oct2817100024619
Quantity: Over 20 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781466694262
Quantity: Over 20 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781466694262
Quantity: Over 20 available
Seller: Ria Christie Collections, Uxbridge, United Kingdom
Condition: New. In. Seller Inventory # ria9781466694262_new
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 301. Seller Inventory # 26373802379
Quantity: 1 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 301. Seller Inventory # 372275796
Quantity: 1 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. pp. 301. Seller Inventory # 18373802369
Quantity: 1 available
Seller: dsmbooks, Liverpool, United Kingdom
Hardcover. Condition: Like New. Like New. book. Seller Inventory # D7F7-3-M-1466694262-6
Quantity: 1 available
Seller: moluna, Greven, Germany
Gebunden. Condition: New. The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Improving Information Security Practices through Computation Intelligence presents an overview of the latest research. Seller Inventory # 447850466
Quantity: Over 20 available
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 1st edition. 328 pages. 11.00x8.50x1.00 inches. In Stock. Seller Inventory # x-1466694262
Quantity: 2 available