Network Security and Cryptography / / Sarhan M. Musa.

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in com...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2018]
©2018
Year of Publication:2018
Language:English
Online Access:
Physical Description:1 online resource (560 p.) :; figures & tables throughout
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781683922933
ctrlnum (DE-B1597)653972
collection bib_alma
record_format marc
spelling Musa, Sarhan M., author. aut http://id.loc.gov/vocabulary/relators/aut
Network Security and Cryptography / Sarhan M. Musa.
Dulles, VA : Mercury Learning and Information, [2018]
©2018
1 online resource (560 p.) : figures & tables throughout
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- Acknowledgments -- Chapter 1 Overview of Computer Networks -- Chapter 2 Mathematical Foundations for Computer Networks -- Chapter 3 Overview of Cryptography -- Chapter 4 Mathematical Foundations for Cryptography -- Chapter 5 Classical Cipher Schemes -- Chapter 6 Modern Symmetric Ciphers -- Chapter 7 Public-Key Cryptography for Data Confidentiality -- Chapter 8 Authentication Schemes -- Chapter 9 Centralized Authentication Service -- Chapter 10 Public Key Infrastructure (PKI) -- Chapter 11 Pretty Good Privacy -- Chapter 12 Internet Security Services -- Chapter 13 System Security. -- Chapter 14 Security of Emerging Technology -- Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)
Computer networks Security measures.
Cryptography.
IT Management & Security.
Protocols and Standards.
Software.
COMPUTERS / Security / Networking. bisacsh
EPUB 9781944534493
print 9781942270836
https://doi.org/10.1515/9781683922933
https://www.degruyter.com/isbn/9781683922933
Cover https://www.degruyter.com/document/cover/isbn/9781683922933/original
language English
format eBook
author Musa, Sarhan M.,
Musa, Sarhan M.,
spellingShingle Musa, Sarhan M.,
Musa, Sarhan M.,
Network Security and Cryptography /
Frontmatter --
Contents --
Preface --
Acknowledgments --
Chapter 1 Overview of Computer Networks --
Chapter 2 Mathematical Foundations for Computer Networks --
Chapter 3 Overview of Cryptography --
Chapter 4 Mathematical Foundations for Cryptography --
Chapter 5 Classical Cipher Schemes --
Chapter 6 Modern Symmetric Ciphers --
Chapter 7 Public-Key Cryptography for Data Confidentiality --
Chapter 8 Authentication Schemes --
Chapter 9 Centralized Authentication Service --
Chapter 10 Public Key Infrastructure (PKI) --
Chapter 11 Pretty Good Privacy --
Chapter 12 Internet Security Services --
Chapter 13 System Security. --
Chapter 14 Security of Emerging Technology --
Bibliography --
Index
author_facet Musa, Sarhan M.,
Musa, Sarhan M.,
author_variant s m m sm smm
s m m sm smm
author_role VerfasserIn
VerfasserIn
author_sort Musa, Sarhan M.,
title Network Security and Cryptography /
title_full Network Security and Cryptography / Sarhan M. Musa.
title_fullStr Network Security and Cryptography / Sarhan M. Musa.
title_full_unstemmed Network Security and Cryptography / Sarhan M. Musa.
title_auth Network Security and Cryptography /
title_alt Frontmatter --
Contents --
Preface --
Acknowledgments --
Chapter 1 Overview of Computer Networks --
Chapter 2 Mathematical Foundations for Computer Networks --
Chapter 3 Overview of Cryptography --
Chapter 4 Mathematical Foundations for Cryptography --
Chapter 5 Classical Cipher Schemes --
Chapter 6 Modern Symmetric Ciphers --
Chapter 7 Public-Key Cryptography for Data Confidentiality --
Chapter 8 Authentication Schemes --
Chapter 9 Centralized Authentication Service --
Chapter 10 Public Key Infrastructure (PKI) --
Chapter 11 Pretty Good Privacy --
Chapter 12 Internet Security Services --
Chapter 13 System Security. --
Chapter 14 Security of Emerging Technology --
Bibliography --
Index
title_new Network Security and Cryptography /
title_sort network security and cryptography /
publisher Mercury Learning and Information,
publishDate 2018
physical 1 online resource (560 p.) : figures & tables throughout
Issued also in print.
contents Frontmatter --
Contents --
Preface --
Acknowledgments --
Chapter 1 Overview of Computer Networks --
Chapter 2 Mathematical Foundations for Computer Networks --
Chapter 3 Overview of Cryptography --
Chapter 4 Mathematical Foundations for Cryptography --
Chapter 5 Classical Cipher Schemes --
Chapter 6 Modern Symmetric Ciphers --
Chapter 7 Public-Key Cryptography for Data Confidentiality --
Chapter 8 Authentication Schemes --
Chapter 9 Centralized Authentication Service --
Chapter 10 Public Key Infrastructure (PKI) --
Chapter 11 Pretty Good Privacy --
Chapter 12 Internet Security Services --
Chapter 13 System Security. --
Chapter 14 Security of Emerging Technology --
Bibliography --
Index
isbn 9781683922933
9781944534493
9781942270836
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 M854 42018
url https://doi.org/10.1515/9781683922933
https://www.degruyter.com/isbn/9781683922933
https://www.degruyter.com/document/cover/isbn/9781683922933/original
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
doi_str_mv 10.1515/9781683922933
work_keys_str_mv AT musasarhanm networksecurityandcryptography
status_str n
ids_txt_mv (DE-B1597)653972
carrierType_str_mv cr
is_hierarchy_title Network Security and Cryptography /
_version_ 1795090193755144192
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04238nam a22006495i 4500</leader><controlfield tag="001">9781683922933</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240306010644.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240306t20182018xxu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683922933</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781683922933</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)653972</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.M854 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Musa, Sarhan M., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security and Cryptography /</subfield><subfield code="c">Sarhan M. Musa.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (560 p.) :</subfield><subfield code="b">figures &amp; tables throughout</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Chapter 1 Overview of Computer Networks -- </subfield><subfield code="t">Chapter 2 Mathematical Foundations for Computer Networks -- </subfield><subfield code="t">Chapter 3 Overview of Cryptography -- </subfield><subfield code="t">Chapter 4 Mathematical Foundations for Cryptography -- </subfield><subfield code="t">Chapter 5 Classical Cipher Schemes -- </subfield><subfield code="t">Chapter 6 Modern Symmetric Ciphers -- </subfield><subfield code="t">Chapter 7 Public-Key Cryptography for Data Confidentiality -- </subfield><subfield code="t">Chapter 8 Authentication Schemes -- </subfield><subfield code="t">Chapter 9 Centralized Authentication Service -- </subfield><subfield code="t">Chapter 10 Public Key Infrastructure (PKI) -- </subfield><subfield code="t">Chapter 11 Pretty Good Privacy -- </subfield><subfield code="t">Chapter 12 Internet Security Services -- </subfield><subfield code="t">Chapter 13 System Security. -- </subfield><subfield code="t">Chapter 14 Security of Emerging Technology -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics &amp; communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management &amp; Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocols and Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781944534493</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781942270836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781683922933</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683922933</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683922933/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection>