Cryptography and Network Security [OP] : : An Introduction / / R. Achary.

This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through a...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2021]
©2021
Year of Publication:2021
Language:English
Online Access:
Physical Description:1 online resource (636 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 03332nam a22006375i 4500
001 9781683926900
003 DE-B1597
005 20230808014301.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230808t20212021 fo d z eng d
020 |a 9781683926900 
035 |a (DE-B1597)654002 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a vau  |c US-VA 
072 7 |a COM043050  |2 bisacsh 
100 1 |a Achary, R.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cryptography and Network Security [OP] :  |b An Introduction /  |c R. Achary. 
264 1 |a Dulles, VA :   |b Mercury Learning and Information,   |c [2021] 
264 4 |c ©2021 
300 |a 1 online resource (636 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Preface --   |t Part 1: Cryptography --   |t Part 2: Security Systems --   |t Part 3: Network Security Applications --   |t Appendix A: Answers for Multiple Choice Questions --   |t Appendix B: References --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more. 
530 |a Issued also in print. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) 
650 4 |a Data. 
650 4 |a Programming. 
650 7 |a COMPUTERS / Security / Networking.  |2 bisacsh 
653 |a Computer Science. 
653 |a Cryptography. 
653 |a Network Security. 
653 |a Networking. 
776 0 |c EPUB  |z 9781683926894 
776 0 |c print  |z 9781683926917 
856 4 0 |u https://www.degruyter.com/isbn/9781683926900 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9781683926900/original 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles 
912 |a PDA12STME 
912 |a PDA13ENGE 
912 |a PDA18STMEE 
912 |a PDA5EBK