Network Security and Cryptography / / Sarhan M. Musa.
This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in compute...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (584 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 05143nam a2200769Ia 4500 | ||
---|---|---|---|
001 | 9781683928829 | ||
003 | DE-B1597 | ||
005 | 20240602123719.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 240602t20222022xxu fo d z eng d | ||
020 | |a 9781683928829 | ||
024 | 7 | |a 10.1515/9781683928829 |2 doi | |
035 | |a (DE-B1597)653984 | ||
035 | |a (OCoLC)1428235805 | ||
040 | |a DE-B1597 |b eng |c DE-B1597 |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
072 | 7 | |a COM064000 |2 bisacsh | |
100 | 1 | |a Musa, Sarhan M., |e author. |4 aut |4 http://id.loc.gov/vocabulary/relators/aut | |
245 | 1 | 0 | |a Network Security and Cryptography / |c Sarhan M. Musa. |
264 | 1 | |a Dulles, VA : |b Mercury Learning and Information, |c [2022] | |
264 | 4 | |c ©2022 | |
300 | |a 1 online resource (584 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
505 | 0 | 0 | |t Frontmatter -- |t Contents -- |t Preface -- |t Chapter 1: Overview of Computer Networks -- |t Chapter 2: Mathematical Foundations for Computer Networks -- |t Chapter 3: Overview of Cryptography -- |t Chapter 4: Mathematical Foundations for Cryptography -- |t Chapter 5: Classical Cipher Schemes -- |t Chapter 6: Modern Symmetric Ciphers -- |t Chapter 7: Public-Key Cryptography for Data Confidentiality -- |t Chapter 8: Authentication Schemes -- |t Chapter 9: Centralized Authentication Service -- |t Chapter 10: Public Key Infrastructure (PKI) -- |t Chapter 11: Pretty Good Privacy -- |t Chapter 12: Internet Security Services -- |t Chapter 13: System Security -- |t Chapter 14: Security of Emerging Technology -- |t Chapter 15: Artificial Intelligence Security -- |t Bibliography -- |t Index |
506 | 0 | |a restricted access |u http://purl.org/coar/access_right/c_16ec |f online access with authorization |2 star | |
520 | |a This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions | ||
530 | |a Issued also in print. | ||
538 | |a Mode of access: Internet via World Wide Web. | ||
546 | |a In English. | ||
588 | 0 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024) | |
650 | 0 | |a Computer networks--Security measures. | |
650 | 0 | |a Cryptography. | |
650 | 4 | |a Artificial Intelligence. | |
650 | 4 | |a Data. | |
650 | 4 | |a IT Management & Security. | |
650 | 7 | |a COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). |2 bisacsh | |
653 | |a Internet security. | ||
653 | |a artificial intelligence. | ||
653 | |a cloud computing, SCADA, blockchain, smart grid, big data analytics. | ||
653 | |a communication. | ||
653 | |a computer science. | ||
653 | |a electronics. | ||
653 | |a pretty good privacy. | ||
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t MLI ASEE STEM eBook-Package 2024 |z 9783111564340 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t MLI and ITGP STEM IT PACKAGE |z 9783111574073 |
773 | 0 | 8 | |i Title is part of eBook package: |d De Gruyter |t Sciendo All Ebooks Trial Collection 2024 |z 9783111502496 |
776 | 0 | |c EPUB |z 9781683928812 | |
776 | 0 | |c print |z 9781683928836 | |
856 | 4 | 0 | |u https://doi.org/10.1515/9781683928829 |
856 | 4 | 0 | |u https://www.degruyter.com/isbn/9781683928829 |
856 | 4 | 2 | |3 Cover |u https://www.degruyter.com/document/cover/isbn/9781683928829/original |
912 | |a 978-3-11-150249-6 Sciendo All Ebooks Trial Collection 2024 |b 2024 | ||
912 | |a 978-3-11-156434-0 MLI ASEE STEM eBook-Package 2024 |b 2024 | ||
912 | |a 978-3-11-157407-3 MLI and ITGP STEM IT PACKAGE | ||
912 | |a EBA_CL_CHCOMSGSEN | ||
912 | |a EBA_DGALL | ||
912 | |a EBA_EBKALL | ||
912 | |a EBA_ECL_CHCOMSGSEN | ||
912 | |a EBA_EEBKALL | ||
912 | |a EBA_ESTMALL | ||
912 | |a EBA_STMALL | ||
912 | |a GBV-deGruyter-alles |