Computer Security and Encryption : : An Introduction / / S. R. Chauhan, S. Jangra.

Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the de...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2020]
©2020
Year of Publication:2020
Language:English
Online Access:
Physical Description:1 online resource (350 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 04365nam a22008535i 4500
001 9781683925293
003 DE-B1597
005 20240307104700.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 240307t20202020xxu fo d z eng d
020 |a 9781683925293 
024 7 |a 10.1515/9781683925293  |2 doi 
035 |a (DE-B1597)653906 
035 |a (OCoLC)1266170866 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a xxu  |c US 
050 4 |a TK5105.59  |b .C43 2020eb 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Chauhan, S. R.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Computer Security and Encryption :  |b An Introduction /  |c S. R. Chauhan, S. Jangra. 
264 1 |a Dulles, VA :   |b Mercury Learning and Information,   |c [2020] 
264 4 |c ©2020 
300 |a 1 online resource (350 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t CONTENTS --   |t Preface --   |t Chapter 1: Security Concepts --   |t Chapter 2: Public Key Cryptography and SSL --   |t Chapter 3: World Wide Web Transaction Security --   |t Chapter 4: IP Security and Firewalls --   |t Chapter 5: Public Key Certificates --   |t Chapter 6: Security at the IP Layer --   |t Chapter 7: Remote Access with Internet Protocol Security --   |t Chapter 8: Virtual Private Networks --   |t Chapter 9: The Security of Emerging Technologies --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers. Features: Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systemsIncludes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN) 
530 |a Issued also in print. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 07. Mrz 2024) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 4 |a Data. 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
653 |a IoT. 
653 |a SCADA. 
653 |a Smart Grid. 
653 |a VPN. 
653 |a WSN. 
653 |a big data analytics. 
653 |a cloud. 
653 |a control systems. 
653 |a cybercrime, cryptography, system security. 
653 |a firewall. 
653 |a inter-object communications. 
653 |a internet of things. 
653 |a ipsec. 
653 |a network design. 
653 |a object model communications. 
653 |a public key crypto. 
653 |a security models. 
700 1 |a Jangra, S.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
776 0 |c EPUB  |z 9781683925309 
776 0 |c print  |z 9781683925316 
856 4 0 |u https://doi.org/10.1515/9781683925293 
856 4 0 |u https://www.degruyter.com/isbn/9781683925293 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9781683925293/original 
912 |a EBA_BACKALL 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBACKALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles