Cryptography and Network Security [OP] : : An Introduction / / R. Achary.
This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through a...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2021] ©2021 |
Year of Publication: | 2021 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (636 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03332nam a22006375i 4500 | ||
---|---|---|---|
001 | 9781683926900 | ||
003 | DE-B1597 | ||
005 | 20230808014301.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 230808t20212021 fo d z eng d | ||
020 | |a 9781683926900 | ||
035 | |a (DE-B1597)654002 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a vau |c US-VA | ||
072 | 7 | |a COM043050 |2 bisacsh | |
100 | 1 | |a Achary, R., |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Cryptography and Network Security [OP] : |b An Introduction / |c R. Achary. |
264 | 1 | |a Dulles, VA : |b Mercury Learning and Information, |c [2021] | |
264 | 4 | |c ©2021 | |
300 | |a 1 online resource (636 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | 0 | |t Frontmatter -- |t Contents -- |t Preface -- |t Part 1: Cryptography -- |t Part 2: Security Systems -- |t Part 3: Network Security Applications -- |t Appendix A: Answers for Multiple Choice Questions -- |t Appendix B: References -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more. | ||
530 | |a Issued also in print. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) | |
650 | 4 | |a Data. | |
650 | 4 | |a Programming. | |
650 | 7 | |a COMPUTERS / Security / Networking. |2 bisacsh | |
653 | |a Computer Science. | ||
653 | |a Cryptography. | ||
653 | |a Network Security. | ||
653 | |a Networking. | ||
776 | 0 | |c EPUB |z 9781683926894 | |
776 | 0 | |c print |z 9781683926917 | |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9781683926900 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/document/cover/isbn/9781683926900/original |
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles | ||
912 | |a PDA12STME | ||
912 | |a PDA13ENGE | ||
912 | |a PDA18STMEE | ||
912 | |a PDA5EBK |