Encyclopedia of Information Science and Technology, Third Edition

IGI Global
3
Free sample

Information acquisition and management has always had a profound impact on societal and organizational progression. However, as computing dramatically advances the level of intelligence associated with management technologies, the breadth of their dispersal, and ultimately the impact of the information itself, the utilization and management of information science and technology also gains profound importance. This change-driven environment creates a critical need for a comprehensive, up-to-date reference encompassing the full range of concepts, issues, methods, technologies, and trends associated with the field.

The Encyclopedia of Information Science and Technology, Third Edition is a 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world. This discipline-defining encyclopedia will serve research needs in numerous fields that are affected by the rapid pace and substantial impact of technological change. With an emphasis on modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field, it is a relevant and essential addition to any academic library’s reference collection.

Read more

About the author

Mehdi Khosrow-Pour, D.B.A. received his Doctorate in Business Administration from the Nova Southeastern University (Florida, USA). Dr. Khosrow-Pour taught undergraduate and graduate information system courses at the Pennsylvania State University – Harrisburg for 20 years. He is currently Executive Editor at IGI Global (www.igi-global.com). He also serves as Executive Director of the Information Resources Management Association (IRMA) (www.irma-international.org), and Executive Director and President of the World Forgotten Children’s Foundation (www.world-forgotten-children.org). He is the author/editor of over twenty books in information technology management. He is also the editor-in-chief of the Information Resources Management Journal, the Journal of Cases on Information Technology, the Journal of Electronic Commerce in Organizations, and the Journal of Information Technology Research, and has authored more than 50 articles published in various conference proceedings and scholarly journals. [Editor]
Read more

Reviews

5.0
3 total
Loading...

Additional Information

Publisher
IGI Global
Read more
Published on
Jul 31, 2014
Read more
Pages
10384
Read more
ISBN
9781466658899
Read more
Language
English
Read more
Genres
Computers / Information Technology
Technology & Engineering / General
Technology & Engineering / Reference
Read more
Content Protection
This content is DRM protected.
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Bruce Schneier
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

". . .the best introduction to cryptography I've ever seen. . . .The book the National Security Agency wanted never to be published. . . ." -Wired Magazine

". . .monumental . . . fascinating . . . comprehensive . . . the definitive work on cryptography for computer programmers . . ." -Dr. Dobb's Journal

". . .easily ranks as one of the most authoritative in its field." -PC Magazine

The book details how programmers and electronic communications professionals can use cryptography-the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. The book shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

With a new Introduction by the author, this premium edition will be a keepsake for all those committed to computer and cyber security.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.