Network Security and Cryptography / / Sarhan M. Musa.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in com...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2018] ©2018 |
Year of Publication: | 2018 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (560 p.) :; figures & tables throughout |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03512nmm a2200649Ia 4500 | ||
---|---|---|---|
001 | 9781683922933 | ||
003 | DE-B1597 | ||
005 | 20240326120151.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 240326t20182018xxu fo d z eng d | ||
020 | |a 9781683922933 | ||
024 | 7 | |a 10.1515/9781683922933 |2 doi | |
035 | |a (DE-B1597)653972 | ||
035 | |a (OCoLC)1425555331 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
050 | 4 | |a TK5105.59 |b .M854 2018 | |
072 | 7 | |a COM043050 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
100 | 1 | |a Musa, Sarhan M., |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Network Security and Cryptography / |c Sarhan M. Musa. |
264 | 1 | |a Dulles, VA : |b Mercury Learning and Information, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (560 p.) : |b figures & tables throughout | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions | ||
530 | |a Issued also in print. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 26. Mrz 2024) | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Cryptography. | |
650 | 4 | |a IT Management & Security. | |
650 | 4 | |a Protocols and Standards. | |
650 | 4 | |a Software. | |
650 | 7 | |a COMPUTERS / Security / Networking. |2 bisacsh | |
776 | 0 | |c EPUB |z 9781944534493 | |
776 | 0 | |c print |z 9781942270836 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9781683922933 |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9781683922933 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/document/cover/isbn/9781683922933/original |
912 | |a EBA_BACKALL | ||
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBACKALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles |