Cryptography and Network Security [OP] : : An Introduction / / R. Achary.
This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through a...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2021] ©2021 |
Year of Publication: | 2021 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (636 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781683926900 |
---|---|
ctrlnum |
(DE-B1597)654002 |
collection |
bib_alma |
record_format |
marc |
spelling |
Achary, R., author. aut http://id.loc.gov/vocabulary/relators/aut Cryptography and Network Security [OP] : An Introduction / R. Achary. Dulles, VA : Mercury Learning and Information, [2021] ©2021 1 online resource (636 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface -- Part 1: Cryptography -- Part 2: Security Systems -- Part 3: Network Security Applications -- Appendix A: Answers for Multiple Choice Questions -- Appendix B: References -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023) Data. Programming. COMPUTERS / Security / Networking. bisacsh Computer Science. Cryptography. Network Security. Networking. EPUB 9781683926894 print 9781683926917 https://www.degruyter.com/isbn/9781683926900 Cover https://www.degruyter.com/document/cover/isbn/9781683926900/original |
language |
English |
format |
eBook |
author |
Achary, R., Achary, R., |
spellingShingle |
Achary, R., Achary, R., Cryptography and Network Security [OP] : An Introduction / Frontmatter -- Contents -- Preface -- Part 1: Cryptography -- Part 2: Security Systems -- Part 3: Network Security Applications -- Appendix A: Answers for Multiple Choice Questions -- Appendix B: References -- Index |
author_facet |
Achary, R., Achary, R., |
author_variant |
r a ra r a ra |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Achary, R., |
title |
Cryptography and Network Security [OP] : An Introduction / |
title_sub |
An Introduction / |
title_full |
Cryptography and Network Security [OP] : An Introduction / R. Achary. |
title_fullStr |
Cryptography and Network Security [OP] : An Introduction / R. Achary. |
title_full_unstemmed |
Cryptography and Network Security [OP] : An Introduction / R. Achary. |
title_auth |
Cryptography and Network Security [OP] : An Introduction / |
title_alt |
Frontmatter -- Contents -- Preface -- Part 1: Cryptography -- Part 2: Security Systems -- Part 3: Network Security Applications -- Appendix A: Answers for Multiple Choice Questions -- Appendix B: References -- Index |
title_new |
Cryptography and Network Security [OP] : |
title_sort |
cryptography and network security [op] : an introduction / |
publisher |
Mercury Learning and Information, |
publishDate |
2021 |
physical |
1 online resource (636 p.) Issued also in print. |
contents |
Frontmatter -- Contents -- Preface -- Part 1: Cryptography -- Part 2: Security Systems -- Part 3: Network Security Applications -- Appendix A: Answers for Multiple Choice Questions -- Appendix B: References -- Index |
isbn |
9781683926900 9781683926894 9781683926917 |
url |
https://www.degruyter.com/isbn/9781683926900 https://www.degruyter.com/document/cover/isbn/9781683926900/original |
illustrated |
Illustrated |
work_keys_str_mv |
AT acharyr cryptographyandnetworksecurityopanintroduction |
status_str |
n |
ids_txt_mv |
(DE-B1597)654002 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cryptography and Network Security [OP] : An Introduction / |
_version_ |
1775793046550478848 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03332nam a22006375i 4500</leader><controlfield tag="001">9781683926900</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230808014301.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230808t20212021 fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683926900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)654002</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">vau</subfield><subfield code="c">US-VA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Achary, R., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and Network Security [OP] :</subfield><subfield code="b">An Introduction /</subfield><subfield code="c">R. Achary.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (636 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Part 1: Cryptography -- </subfield><subfield code="t">Part 2: Security Systems -- </subfield><subfield code="t">Part 3: Network Security Applications -- </subfield><subfield code="t">Appendix A: Answers for Multiple Choice Questions -- </subfield><subfield code="t">Appendix B: References -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer Science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Networking.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683926894</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683926917</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683926900</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683926900/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |