Network Security and Cryptography / / Sarhan M. Musa.
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in com...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2018] ©2018 |
Year of Publication: | 2018 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (560 p.) :; figures & tables throughout |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781683922933 |
---|---|
ctrlnum |
(DE-B1597)653972 |
collection |
bib_alma |
record_format |
marc |
spelling |
Musa, Sarhan M., author. aut http://id.loc.gov/vocabulary/relators/aut Network Security and Cryptography / Sarhan M. Musa. Dulles, VA : Mercury Learning and Information, [2018] ©2018 1 online resource (560 p.) : figures & tables throughout text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface -- Acknowledgments -- Chapter 1 Overview of Computer Networks -- Chapter 2 Mathematical Foundations for Computer Networks -- Chapter 3 Overview of Cryptography -- Chapter 4 Mathematical Foundations for Cryptography -- Chapter 5 Classical Cipher Schemes -- Chapter 6 Modern Symmetric Ciphers -- Chapter 7 Public-Key Cryptography for Data Confidentiality -- Chapter 8 Authentication Schemes -- Chapter 9 Centralized Authentication Service -- Chapter 10 Public Key Infrastructure (PKI) -- Chapter 11 Pretty Good Privacy -- Chapter 12 Internet Security Services -- Chapter 13 System Security. -- Chapter 14 Security of Emerging Technology -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024) Computer networks Security measures. Cryptography. IT Management & Security. Protocols and Standards. Software. COMPUTERS / Security / Networking. bisacsh EPUB 9781944534493 print 9781942270836 https://doi.org/10.1515/9781683922933 https://www.degruyter.com/isbn/9781683922933 Cover https://www.degruyter.com/document/cover/isbn/9781683922933/original |
language |
English |
format |
eBook |
author |
Musa, Sarhan M., Musa, Sarhan M., |
spellingShingle |
Musa, Sarhan M., Musa, Sarhan M., Network Security and Cryptography / Frontmatter -- Contents -- Preface -- Acknowledgments -- Chapter 1 Overview of Computer Networks -- Chapter 2 Mathematical Foundations for Computer Networks -- Chapter 3 Overview of Cryptography -- Chapter 4 Mathematical Foundations for Cryptography -- Chapter 5 Classical Cipher Schemes -- Chapter 6 Modern Symmetric Ciphers -- Chapter 7 Public-Key Cryptography for Data Confidentiality -- Chapter 8 Authentication Schemes -- Chapter 9 Centralized Authentication Service -- Chapter 10 Public Key Infrastructure (PKI) -- Chapter 11 Pretty Good Privacy -- Chapter 12 Internet Security Services -- Chapter 13 System Security. -- Chapter 14 Security of Emerging Technology -- Bibliography -- Index |
author_facet |
Musa, Sarhan M., Musa, Sarhan M., |
author_variant |
s m m sm smm s m m sm smm |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Musa, Sarhan M., |
title |
Network Security and Cryptography / |
title_full |
Network Security and Cryptography / Sarhan M. Musa. |
title_fullStr |
Network Security and Cryptography / Sarhan M. Musa. |
title_full_unstemmed |
Network Security and Cryptography / Sarhan M. Musa. |
title_auth |
Network Security and Cryptography / |
title_alt |
Frontmatter -- Contents -- Preface -- Acknowledgments -- Chapter 1 Overview of Computer Networks -- Chapter 2 Mathematical Foundations for Computer Networks -- Chapter 3 Overview of Cryptography -- Chapter 4 Mathematical Foundations for Cryptography -- Chapter 5 Classical Cipher Schemes -- Chapter 6 Modern Symmetric Ciphers -- Chapter 7 Public-Key Cryptography for Data Confidentiality -- Chapter 8 Authentication Schemes -- Chapter 9 Centralized Authentication Service -- Chapter 10 Public Key Infrastructure (PKI) -- Chapter 11 Pretty Good Privacy -- Chapter 12 Internet Security Services -- Chapter 13 System Security. -- Chapter 14 Security of Emerging Technology -- Bibliography -- Index |
title_new |
Network Security and Cryptography / |
title_sort |
network security and cryptography / |
publisher |
Mercury Learning and Information, |
publishDate |
2018 |
physical |
1 online resource (560 p.) : figures & tables throughout Issued also in print. |
contents |
Frontmatter -- Contents -- Preface -- Acknowledgments -- Chapter 1 Overview of Computer Networks -- Chapter 2 Mathematical Foundations for Computer Networks -- Chapter 3 Overview of Cryptography -- Chapter 4 Mathematical Foundations for Cryptography -- Chapter 5 Classical Cipher Schemes -- Chapter 6 Modern Symmetric Ciphers -- Chapter 7 Public-Key Cryptography for Data Confidentiality -- Chapter 8 Authentication Schemes -- Chapter 9 Centralized Authentication Service -- Chapter 10 Public Key Infrastructure (PKI) -- Chapter 11 Pretty Good Privacy -- Chapter 12 Internet Security Services -- Chapter 13 System Security. -- Chapter 14 Security of Emerging Technology -- Bibliography -- Index |
isbn |
9781683922933 9781944534493 9781942270836 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 M854 42018 |
url |
https://doi.org/10.1515/9781683922933 https://www.degruyter.com/isbn/9781683922933 https://www.degruyter.com/document/cover/isbn/9781683922933/original |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
doi_str_mv |
10.1515/9781683922933 |
work_keys_str_mv |
AT musasarhanm networksecurityandcryptography |
status_str |
n |
ids_txt_mv |
(DE-B1597)653972 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Network Security and Cryptography / |
_version_ |
1795090193755144192 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04238nam a22006495i 4500</leader><controlfield tag="001">9781683922933</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240306010644.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240306t20182018xxu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683922933</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781683922933</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)653972</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.M854 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Musa, Sarhan M., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security and Cryptography /</subfield><subfield code="c">Sarhan M. Musa.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (560 p.) :</subfield><subfield code="b">figures & tables throughout</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">Chapter 1 Overview of Computer Networks -- </subfield><subfield code="t">Chapter 2 Mathematical Foundations for Computer Networks -- </subfield><subfield code="t">Chapter 3 Overview of Cryptography -- </subfield><subfield code="t">Chapter 4 Mathematical Foundations for Cryptography -- </subfield><subfield code="t">Chapter 5 Classical Cipher Schemes -- </subfield><subfield code="t">Chapter 6 Modern Symmetric Ciphers -- </subfield><subfield code="t">Chapter 7 Public-Key Cryptography for Data Confidentiality -- </subfield><subfield code="t">Chapter 8 Authentication Schemes -- </subfield><subfield code="t">Chapter 9 Centralized Authentication Service -- </subfield><subfield code="t">Chapter 10 Public Key Infrastructure (PKI) -- </subfield><subfield code="t">Chapter 11 Pretty Good Privacy -- </subfield><subfield code="t">Chapter 12 Internet Security Services -- </subfield><subfield code="t">Chapter 13 System Security. -- </subfield><subfield code="t">Chapter 14 Security of Emerging Technology -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management & Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocols and Standards.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781944534493</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781942270836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781683922933</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683922933</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683922933/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection> |