 |
|
 |  |  Building A Global Information Assurance ProgramGovernments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are... |  |  |
|
 The Twofish Encryption Algorithm: A 128-Bit Block CipherThe first and only guide to one of today’s most important new cryptography algorithms The Twofish Encryption Algorithm A symmetric block cipher that accepts keys of any length, up to 256 bits, Twofish is among the new encryption algorithms being considered by the National Institute of Science and Technology (NIST) as a replacement for the DES... |  |  |  |  |
|
 Information Warfare and Organizational Decision-MakingOrganizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... |  |  |  |  |
|
|
Result Page: 788 787 786 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 |