Network Security and Cryptography / / Sarhan M. Musa.

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in compute...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (584 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05143nam a2200769Ia 4500
001 9781683928829
003 DE-B1597
005 20240602123719.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 240602t20222022xxu fo d z eng d
020 |a 9781683928829 
024 7 |a 10.1515/9781683928829  |2 doi 
035 |a (DE-B1597)653984 
035 |a (OCoLC)1428235805 
040 |a DE-B1597  |b eng  |c DE-B1597  |e rda 
041 0 |a eng 
044 |a xxu  |c US 
072 7 |a COM064000  |2 bisacsh 
100 1 |a Musa, Sarhan M.,   |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Network Security and Cryptography /  |c Sarhan M. Musa. 
264 1 |a Dulles, VA :   |b Mercury Learning and Information,   |c [2022] 
264 4 |c ©2022 
300 |a 1 online resource (584 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 0 |t Frontmatter --   |t Contents --   |t Preface --   |t Chapter 1: Overview of Computer Networks --   |t Chapter 2: Mathematical Foundations for Computer Networks --   |t Chapter 3: Overview of Cryptography --   |t Chapter 4: Mathematical Foundations for Cryptography --   |t Chapter 5: Classical Cipher Schemes --   |t Chapter 6: Modern Symmetric Ciphers --   |t Chapter 7: Public-Key Cryptography for Data Confidentiality --   |t Chapter 8: Authentication Schemes --   |t Chapter 9: Centralized Authentication Service --   |t Chapter 10: Public Key Infrastructure (PKI) --   |t Chapter 11: Pretty Good Privacy --   |t Chapter 12: Internet Security Services --   |t Chapter 13: System Security --   |t Chapter 14: Security of Emerging Technology --   |t Chapter 15: Artificial Intelligence Security --   |t Bibliography --   |t Index 
506 0 |a restricted access  |u http://purl.org/coar/access_right/c_16ec  |f online access with authorization  |2 star 
520 |a This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions 
530 |a Issued also in print. 
538 |a Mode of access: Internet via World Wide Web. 
546 |a In English. 
588 0 |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024) 
650 0 |a Computer networks--Security measures. 
650 0 |a Cryptography. 
650 4 |a Artificial Intelligence. 
650 4 |a Data. 
650 4 |a IT Management & Security. 
650 7 |a COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce).  |2 bisacsh 
653 |a Internet security. 
653 |a artificial intelligence. 
653 |a cloud computing, SCADA, blockchain, smart grid, big data analytics. 
653 |a communication. 
653 |a computer science. 
653 |a electronics. 
653 |a pretty good privacy. 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t MLI ASEE STEM eBook-Package 2024  |z 9783111564340 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t MLI and ITGP STEM IT PACKAGE  |z 9783111574073 
773 0 8 |i Title is part of eBook package:  |d De Gruyter  |t Sciendo All Ebooks Trial Collection 2024  |z 9783111502496 
776 0 |c EPUB  |z 9781683928812 
776 0 |c print  |z 9781683928836 
856 4 0 |u https://doi.org/10.1515/9781683928829 
856 4 0 |u https://www.degruyter.com/isbn/9781683928829 
856 4 2 |3 Cover  |u https://www.degruyter.com/document/cover/isbn/9781683928829/original 
912 |a 978-3-11-150249-6 Sciendo All Ebooks Trial Collection 2024  |b 2024 
912 |a 978-3-11-156434-0 MLI ASEE STEM eBook-Package 2024  |b 2024 
912 |a 978-3-11-157407-3 MLI and ITGP STEM IT PACKAGE 
912 |a EBA_CL_CHCOMSGSEN 
912 |a EBA_DGALL 
912 |a EBA_EBKALL 
912 |a EBA_ECL_CHCOMSGSEN 
912 |a EBA_EEBKALL 
912 |a EBA_ESTMALL 
912 |a EBA_STMALL 
912 |a GBV-deGruyter-alles