Cryptography and Network Security [OP] : : An Introduction / / R. Achary.

This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through a...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2021]
©2021
Year of Publication:2021
Language:English
Online Access:
Physical Description:1 online resource (636 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781683926900
ctrlnum (DE-B1597)654002
collection bib_alma
record_format marc
spelling Achary, R., author. aut http://id.loc.gov/vocabulary/relators/aut
Cryptography and Network Security [OP] : An Introduction / R. Achary.
Dulles, VA : Mercury Learning and Information, [2021]
©2021
1 online resource (636 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- Part 1: Cryptography -- Part 2: Security Systems -- Part 3: Network Security Applications -- Appendix A: Answers for Multiple Choice Questions -- Appendix B: References -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)
Data.
Programming.
COMPUTERS / Security / Networking. bisacsh
Computer Science.
Cryptography.
Network Security.
Networking.
EPUB 9781683926894
print 9781683926917
https://www.degruyter.com/isbn/9781683926900
Cover https://www.degruyter.com/document/cover/isbn/9781683926900/original
language English
format eBook
author Achary, R.,
Achary, R.,
spellingShingle Achary, R.,
Achary, R.,
Cryptography and Network Security [OP] : An Introduction /
Frontmatter --
Contents --
Preface --
Part 1: Cryptography --
Part 2: Security Systems --
Part 3: Network Security Applications --
Appendix A: Answers for Multiple Choice Questions --
Appendix B: References --
Index
author_facet Achary, R.,
Achary, R.,
author_variant r a ra
r a ra
author_role VerfasserIn
VerfasserIn
author_sort Achary, R.,
title Cryptography and Network Security [OP] : An Introduction /
title_sub An Introduction /
title_full Cryptography and Network Security [OP] : An Introduction / R. Achary.
title_fullStr Cryptography and Network Security [OP] : An Introduction / R. Achary.
title_full_unstemmed Cryptography and Network Security [OP] : An Introduction / R. Achary.
title_auth Cryptography and Network Security [OP] : An Introduction /
title_alt Frontmatter --
Contents --
Preface --
Part 1: Cryptography --
Part 2: Security Systems --
Part 3: Network Security Applications --
Appendix A: Answers for Multiple Choice Questions --
Appendix B: References --
Index
title_new Cryptography and Network Security [OP] :
title_sort cryptography and network security [op] : an introduction /
publisher Mercury Learning and Information,
publishDate 2021
physical 1 online resource (636 p.)
Issued also in print.
contents Frontmatter --
Contents --
Preface --
Part 1: Cryptography --
Part 2: Security Systems --
Part 3: Network Security Applications --
Appendix A: Answers for Multiple Choice Questions --
Appendix B: References --
Index
isbn 9781683926900
9781683926894
9781683926917
url https://www.degruyter.com/isbn/9781683926900
https://www.degruyter.com/document/cover/isbn/9781683926900/original
illustrated Illustrated
work_keys_str_mv AT acharyr cryptographyandnetworksecurityopanintroduction
status_str n
ids_txt_mv (DE-B1597)654002
carrierType_str_mv cr
is_hierarchy_title Cryptography and Network Security [OP] : An Introduction /
_version_ 1775793046550478848
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03332nam a22006375i 4500</leader><controlfield tag="001">9781683926900</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230808014301.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230808t20212021 fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683926900</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)654002</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">vau</subfield><subfield code="c">US-VA</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Achary, R., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and Network Security [OP] :</subfield><subfield code="b">An Introduction /</subfield><subfield code="c">R. Achary.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (636 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Part 1: Cryptography -- </subfield><subfield code="t">Part 2: Security Systems -- </subfield><subfield code="t">Part 3: Network Security Applications -- </subfield><subfield code="t">Appendix A: Answers for Multiple Choice Questions -- </subfield><subfield code="t">Appendix B: References -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is an introduction to fundamental concepts in the fields of cryptography and network security. Because cryptography is highly vulnerable to program errors, a simple testing of the cryptosystem will usually uncover a security vulnerability. In this book the author takes the reader through all of the important design and implementation details of various cryptographic algorithms and network security protocols to enforce network security. The book is divided into four parts: Cryptography, Security Systems, Network Security Applications, and System Security. Numerous diagrams and examples throughout the book are used to explain cryptography and network security concepts. FEATURES:Covers key concepts related to cryptography and network securityIncludes chapters on modern symmetric key block cipher algorithms, information security, message integrity, authentication, digital signature, key management, intruder detection, network layer security, data link layer security, NSM, firewall design, and more.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 08. Aug 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Computer Science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptography.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Network Security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Networking.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683926894</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683926917</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683926900</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683926900/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>