Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
The Practice of Remote Education on Information Security
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Hi-index | 0.00 |
As the sophistication of intruders' increases, so does the incidents of information integrity breaches and network attacks. In response, very complex cryptographic processes have started being employed, such as chaos theory and quantum theory, in an ...