Inicio > > Seguridad informática > Implementing Computational Intelligence Techniques for Security Systems Design
Implementing Computational Intelligence Techniques for Security Systems Design

Implementing Computational Intelligence Techniques for Security Systems Design

Implementing Computational Intelligence Techniques for Security Systems Design

 

282,10 €
IVA incluido
Disponible
Editorial:
IGI Global
Año de edición:
2020
Materia
Seguridad informática
ISBN:
9781799824183
282,10 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    87,03 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    105,66 €

  • Automated Software Diversity
    Lucas Davi / Per Larsen / Stefan Brunthaler
    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the ...
    Consulta disponibilidad

    47,21 €

  • CEH Certified Ethical Hacker Certification The Ultimate Study Guide to Practice Questions and Master the Exam
    Jake T Mills
    Are you preparing to become a Certified Ethical Hacker (CEH)? This comprehensive guide is designed to assist you in mastering the concepts, techniques, and skills necessary to ace the CEH certification exam. Inside this book, you’ll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensu...
    Disponible

    35,69 €

  • Private Information Retrieval
    Elisa Bertino / Russell Paulet / Xun Yi
    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based servic...
    Consulta disponibilidad

    50,52 €