Network Security and Cryptography / / Sarhan M. Musa.

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in compute...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024
VerfasserIn:
Place / Publishing House:Dulles, VA : : Mercury Learning and Information, , [2022]
©2022
Year of Publication:2022
Language:English
Online Access:
Physical Description:1 online resource (584 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9781683928829
ctrlnum (DE-B1597)653984
(OCoLC)1428235805
collection bib_alma
record_format marc
spelling Musa, Sarhan M., author. aut http://id.loc.gov/vocabulary/relators/aut
Network Security and Cryptography / Sarhan M. Musa.
Dulles, VA : Mercury Learning and Information, [2022]
©2022
1 online resource (584 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Preface -- Chapter 1: Overview of Computer Networks -- Chapter 2: Mathematical Foundations for Computer Networks -- Chapter 3: Overview of Cryptography -- Chapter 4: Mathematical Foundations for Cryptography -- Chapter 5: Classical Cipher Schemes -- Chapter 6: Modern Symmetric Ciphers -- Chapter 7: Public-Key Cryptography for Data Confidentiality -- Chapter 8: Authentication Schemes -- Chapter 9: Centralized Authentication Service -- Chapter 10: Public Key Infrastructure (PKI) -- Chapter 11: Pretty Good Privacy -- Chapter 12: Internet Security Services -- Chapter 13: System Security -- Chapter 14: Security of Emerging Technology -- Chapter 15: Artificial Intelligence Security -- Bibliography -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024)
Computer networks--Security measures.
Cryptography.
Artificial Intelligence.
Data.
IT Management & Security.
COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). bisacsh
Internet security.
artificial intelligence.
cloud computing, SCADA, blockchain, smart grid, big data analytics.
communication.
computer science.
electronics.
pretty good privacy.
Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 9783111564340
Title is part of eBook package: De Gruyter MLI and ITGP STEM IT PACKAGE 9783111574073
Title is part of eBook package: De Gruyter Sciendo All Ebooks Trial Collection 2024 9783111502496
EPUB 9781683928812
print 9781683928836
https://doi.org/10.1515/9781683928829
https://www.degruyter.com/isbn/9781683928829
Cover https://www.degruyter.com/document/cover/isbn/9781683928829/original
language English
format eBook
author Musa, Sarhan M.,
Musa, Sarhan M.,
spellingShingle Musa, Sarhan M.,
Musa, Sarhan M.,
Network Security and Cryptography /
Frontmatter --
Contents --
Preface --
Chapter 1: Overview of Computer Networks --
Chapter 2: Mathematical Foundations for Computer Networks --
Chapter 3: Overview of Cryptography --
Chapter 4: Mathematical Foundations for Cryptography --
Chapter 5: Classical Cipher Schemes --
Chapter 6: Modern Symmetric Ciphers --
Chapter 7: Public-Key Cryptography for Data Confidentiality --
Chapter 8: Authentication Schemes --
Chapter 9: Centralized Authentication Service --
Chapter 10: Public Key Infrastructure (PKI) --
Chapter 11: Pretty Good Privacy --
Chapter 12: Internet Security Services --
Chapter 13: System Security --
Chapter 14: Security of Emerging Technology --
Chapter 15: Artificial Intelligence Security --
Bibliography --
Index
author_facet Musa, Sarhan M.,
Musa, Sarhan M.,
author_variant s m m sm smm
s m m sm smm
author_role VerfasserIn
VerfasserIn
author_sort Musa, Sarhan M.,
title Network Security and Cryptography /
title_full Network Security and Cryptography / Sarhan M. Musa.
title_fullStr Network Security and Cryptography / Sarhan M. Musa.
title_full_unstemmed Network Security and Cryptography / Sarhan M. Musa.
title_auth Network Security and Cryptography /
title_alt Frontmatter --
Contents --
Preface --
Chapter 1: Overview of Computer Networks --
Chapter 2: Mathematical Foundations for Computer Networks --
Chapter 3: Overview of Cryptography --
Chapter 4: Mathematical Foundations for Cryptography --
Chapter 5: Classical Cipher Schemes --
Chapter 6: Modern Symmetric Ciphers --
Chapter 7: Public-Key Cryptography for Data Confidentiality --
Chapter 8: Authentication Schemes --
Chapter 9: Centralized Authentication Service --
Chapter 10: Public Key Infrastructure (PKI) --
Chapter 11: Pretty Good Privacy --
Chapter 12: Internet Security Services --
Chapter 13: System Security --
Chapter 14: Security of Emerging Technology --
Chapter 15: Artificial Intelligence Security --
Bibliography --
Index
title_new Network Security and Cryptography /
title_sort network security and cryptography /
publisher Mercury Learning and Information,
publishDate 2022
physical 1 online resource (584 p.)
Issued also in print.
contents Frontmatter --
Contents --
Preface --
Chapter 1: Overview of Computer Networks --
Chapter 2: Mathematical Foundations for Computer Networks --
Chapter 3: Overview of Cryptography --
Chapter 4: Mathematical Foundations for Cryptography --
Chapter 5: Classical Cipher Schemes --
Chapter 6: Modern Symmetric Ciphers --
Chapter 7: Public-Key Cryptography for Data Confidentiality --
Chapter 8: Authentication Schemes --
Chapter 9: Centralized Authentication Service --
Chapter 10: Public Key Infrastructure (PKI) --
Chapter 11: Pretty Good Privacy --
Chapter 12: Internet Security Services --
Chapter 13: System Security --
Chapter 14: Security of Emerging Technology --
Chapter 15: Artificial Intelligence Security --
Bibliography --
Index
isbn 9781683928829
9783111564340
9783111574073
9783111502496
9781683928812
9781683928836
url https://doi.org/10.1515/9781683928829
https://www.degruyter.com/isbn/9781683928829
https://www.degruyter.com/document/cover/isbn/9781683928829/original
illustrated Not Illustrated
doi_str_mv 10.1515/9781683928829
oclc_num 1428235805
work_keys_str_mv AT musasarhanm networksecurityandcryptography
status_str n
ids_txt_mv (DE-B1597)653984
(OCoLC)1428235805
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024
Title is part of eBook package: De Gruyter MLI and ITGP STEM IT PACKAGE
Title is part of eBook package: De Gruyter Sciendo All Ebooks Trial Collection 2024
is_hierarchy_title Network Security and Cryptography /
container_title Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024
_version_ 1806144019431948288
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05143nam a2200769Ia 4500</leader><controlfield tag="001">9781683928829</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240602123719.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240602t20222022xxu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683928829</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781683928829</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)653984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1428235805</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM064000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Musa, Sarhan M., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security and Cryptography /</subfield><subfield code="c">Sarhan M. Musa.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (584 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Chapter 1: Overview of Computer Networks -- </subfield><subfield code="t">Chapter 2: Mathematical Foundations for Computer Networks -- </subfield><subfield code="t">Chapter 3: Overview of Cryptography -- </subfield><subfield code="t">Chapter 4: Mathematical Foundations for Cryptography -- </subfield><subfield code="t">Chapter 5: Classical Cipher Schemes -- </subfield><subfield code="t">Chapter 6: Modern Symmetric Ciphers -- </subfield><subfield code="t">Chapter 7: Public-Key Cryptography for Data Confidentiality -- </subfield><subfield code="t">Chapter 8: Authentication Schemes -- </subfield><subfield code="t">Chapter 9: Centralized Authentication Service -- </subfield><subfield code="t">Chapter 10: Public Key Infrastructure (PKI) -- </subfield><subfield code="t">Chapter 11: Pretty Good Privacy -- </subfield><subfield code="t">Chapter 12: Internet Security Services -- </subfield><subfield code="t">Chapter 13: System Security -- </subfield><subfield code="t">Chapter 14: Security of Emerging Technology -- </subfield><subfield code="t">Chapter 15: Artificial Intelligence Security -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics &amp; communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks--Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management &amp; Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Electronic Commerce (see also headings under BUSINESS &amp; ECONOMICS / ECommerce).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">artificial intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing, SCADA, blockchain, smart grid, big data analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">electronics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">pretty good privacy.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">MLI ASEE STEM eBook-Package 2024</subfield><subfield code="z">9783111564340</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">MLI and ITGP STEM IT PACKAGE</subfield><subfield code="z">9783111574073</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Sciendo All Ebooks Trial Collection 2024</subfield><subfield code="z">9783111502496</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683928812</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683928836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781683928829</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683928829</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683928829/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-150249-6 Sciendo All Ebooks Trial Collection 2024</subfield><subfield code="b">2024</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-156434-0 MLI ASEE STEM eBook-Package 2024</subfield><subfield code="b">2024</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-157407-3 MLI and ITGP STEM IT PACKAGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection>