Editors Awad, El-Alfy, and Al-Bastaki present students, academics, researchers, and professionals working in a variety of contexts with a collection of academic papers and scholarly articles focused on the enhancement of information security through computational intelligence. The editors have organized the ten contributions that make up the main body of the text in five parts devoted to applications of evolutionary computation in cryptology, intelligent intrusion detection, authentication, multimedia security, and a wide variety of other related subjects.
– ProtoView Book Abstracts (formerly Book News, Inc.)
It's a good reminder to look on the security side of information management as it represents current and future challenges for developers and end-users. The proposed algorithm in chapter 3 (GADS) was very clear and none of the articles I have read on similar subjects were as relevant as those presented in this title.
– Ahmed Asad, Network Engineer, Bahrain