Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.(2005). AMD64 virtualization codenamed a#39;a#39;pacificaa#39;a#39; technology. Publication No. 33047. Secure Virtual Machine Architecture Reference Manual, Revision 3.01. 3G. Americas. (2008). Security and trust in mobile applications. Technical Report.
|Title||:||Theory and Practice of Cryptography Solutions for Secure Information Systems|
|Publisher||:||IGI Global - 2013-05-31|