Network Security and Cryptography / / Sarhan M. Musa.
This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in compute...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 |
---|---|
VerfasserIn: | |
Place / Publishing House: | Dulles, VA : : Mercury Learning and Information, , [2022] ©2022 |
Year of Publication: | 2022 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (584 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9781683928829 |
---|---|
ctrlnum |
(DE-B1597)653984 (OCoLC)1428235805 |
collection |
bib_alma |
record_format |
marc |
spelling |
Musa, Sarhan M., author. aut http://id.loc.gov/vocabulary/relators/aut Network Security and Cryptography / Sarhan M. Musa. Dulles, VA : Mercury Learning and Information, [2022] ©2022 1 online resource (584 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Preface -- Chapter 1: Overview of Computer Networks -- Chapter 2: Mathematical Foundations for Computer Networks -- Chapter 3: Overview of Cryptography -- Chapter 4: Mathematical Foundations for Cryptography -- Chapter 5: Classical Cipher Schemes -- Chapter 6: Modern Symmetric Ciphers -- Chapter 7: Public-Key Cryptography for Data Confidentiality -- Chapter 8: Authentication Schemes -- Chapter 9: Centralized Authentication Service -- Chapter 10: Public Key Infrastructure (PKI) -- Chapter 11: Pretty Good Privacy -- Chapter 12: Internet Security Services -- Chapter 13: System Security -- Chapter 14: Security of Emerging Technology -- Chapter 15: Artificial Intelligence Security -- Bibliography -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024) Computer networks--Security measures. Cryptography. Artificial Intelligence. Data. IT Management & Security. COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce). bisacsh Internet security. artificial intelligence. cloud computing, SCADA, blockchain, smart grid, big data analytics. communication. computer science. electronics. pretty good privacy. Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 9783111564340 Title is part of eBook package: De Gruyter MLI and ITGP STEM IT PACKAGE 9783111574073 Title is part of eBook package: De Gruyter Sciendo All Ebooks Trial Collection 2024 9783111502496 EPUB 9781683928812 print 9781683928836 https://doi.org/10.1515/9781683928829 https://www.degruyter.com/isbn/9781683928829 Cover https://www.degruyter.com/document/cover/isbn/9781683928829/original |
language |
English |
format |
eBook |
author |
Musa, Sarhan M., Musa, Sarhan M., |
spellingShingle |
Musa, Sarhan M., Musa, Sarhan M., Network Security and Cryptography / Frontmatter -- Contents -- Preface -- Chapter 1: Overview of Computer Networks -- Chapter 2: Mathematical Foundations for Computer Networks -- Chapter 3: Overview of Cryptography -- Chapter 4: Mathematical Foundations for Cryptography -- Chapter 5: Classical Cipher Schemes -- Chapter 6: Modern Symmetric Ciphers -- Chapter 7: Public-Key Cryptography for Data Confidentiality -- Chapter 8: Authentication Schemes -- Chapter 9: Centralized Authentication Service -- Chapter 10: Public Key Infrastructure (PKI) -- Chapter 11: Pretty Good Privacy -- Chapter 12: Internet Security Services -- Chapter 13: System Security -- Chapter 14: Security of Emerging Technology -- Chapter 15: Artificial Intelligence Security -- Bibliography -- Index |
author_facet |
Musa, Sarhan M., Musa, Sarhan M., |
author_variant |
s m m sm smm s m m sm smm |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Musa, Sarhan M., |
title |
Network Security and Cryptography / |
title_full |
Network Security and Cryptography / Sarhan M. Musa. |
title_fullStr |
Network Security and Cryptography / Sarhan M. Musa. |
title_full_unstemmed |
Network Security and Cryptography / Sarhan M. Musa. |
title_auth |
Network Security and Cryptography / |
title_alt |
Frontmatter -- Contents -- Preface -- Chapter 1: Overview of Computer Networks -- Chapter 2: Mathematical Foundations for Computer Networks -- Chapter 3: Overview of Cryptography -- Chapter 4: Mathematical Foundations for Cryptography -- Chapter 5: Classical Cipher Schemes -- Chapter 6: Modern Symmetric Ciphers -- Chapter 7: Public-Key Cryptography for Data Confidentiality -- Chapter 8: Authentication Schemes -- Chapter 9: Centralized Authentication Service -- Chapter 10: Public Key Infrastructure (PKI) -- Chapter 11: Pretty Good Privacy -- Chapter 12: Internet Security Services -- Chapter 13: System Security -- Chapter 14: Security of Emerging Technology -- Chapter 15: Artificial Intelligence Security -- Bibliography -- Index |
title_new |
Network Security and Cryptography / |
title_sort |
network security and cryptography / |
publisher |
Mercury Learning and Information, |
publishDate |
2022 |
physical |
1 online resource (584 p.) Issued also in print. |
contents |
Frontmatter -- Contents -- Preface -- Chapter 1: Overview of Computer Networks -- Chapter 2: Mathematical Foundations for Computer Networks -- Chapter 3: Overview of Cryptography -- Chapter 4: Mathematical Foundations for Cryptography -- Chapter 5: Classical Cipher Schemes -- Chapter 6: Modern Symmetric Ciphers -- Chapter 7: Public-Key Cryptography for Data Confidentiality -- Chapter 8: Authentication Schemes -- Chapter 9: Centralized Authentication Service -- Chapter 10: Public Key Infrastructure (PKI) -- Chapter 11: Pretty Good Privacy -- Chapter 12: Internet Security Services -- Chapter 13: System Security -- Chapter 14: Security of Emerging Technology -- Chapter 15: Artificial Intelligence Security -- Bibliography -- Index |
isbn |
9781683928829 9783111564340 9783111574073 9783111502496 9781683928812 9781683928836 |
url |
https://doi.org/10.1515/9781683928829 https://www.degruyter.com/isbn/9781683928829 https://www.degruyter.com/document/cover/isbn/9781683928829/original |
illustrated |
Not Illustrated |
doi_str_mv |
10.1515/9781683928829 |
oclc_num |
1428235805 |
work_keys_str_mv |
AT musasarhanm networksecurityandcryptography |
status_str |
n |
ids_txt_mv |
(DE-B1597)653984 (OCoLC)1428235805 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 Title is part of eBook package: De Gruyter MLI and ITGP STEM IT PACKAGE Title is part of eBook package: De Gruyter Sciendo All Ebooks Trial Collection 2024 |
is_hierarchy_title |
Network Security and Cryptography / |
container_title |
Title is part of eBook package: De Gruyter MLI ASEE STEM eBook-Package 2024 |
_version_ |
1806144019431948288 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05143nam a2200769Ia 4500</leader><controlfield tag="001">9781683928829</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20240602123719.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">240602t20222022xxu fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683928829</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781683928829</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)653984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1428235805</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM064000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Musa, Sarhan M., </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security and Cryptography /</subfield><subfield code="c">Sarhan M. Musa.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA : </subfield><subfield code="b">Mercury Learning and Information, </subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (584 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Preface -- </subfield><subfield code="t">Chapter 1: Overview of Computer Networks -- </subfield><subfield code="t">Chapter 2: Mathematical Foundations for Computer Networks -- </subfield><subfield code="t">Chapter 3: Overview of Cryptography -- </subfield><subfield code="t">Chapter 4: Mathematical Foundations for Cryptography -- </subfield><subfield code="t">Chapter 5: Classical Cipher Schemes -- </subfield><subfield code="t">Chapter 6: Modern Symmetric Ciphers -- </subfield><subfield code="t">Chapter 7: Public-Key Cryptography for Data Confidentiality -- </subfield><subfield code="t">Chapter 8: Authentication Schemes -- </subfield><subfield code="t">Chapter 9: Centralized Authentication Service -- </subfield><subfield code="t">Chapter 10: Public Key Infrastructure (PKI) -- </subfield><subfield code="t">Chapter 11: Pretty Good Privacy -- </subfield><subfield code="t">Chapter 12: Internet Security Services -- </subfield><subfield code="t">Chapter 13: System Security -- </subfield><subfield code="t">Chapter 14: Security of Emerging Technology -- </subfield><subfield code="t">Chapter 15: Artificial Intelligence Security -- </subfield><subfield code="t">Bibliography -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas. Features: Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more Features separate chapters on the mathematics related to network security and cryptography Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security Includes end of chapter review questions</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Jun 2024)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks--Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cryptography.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management & Security.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Electronic Commerce (see also headings under BUSINESS & ECONOMICS / ECommerce).</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Internet security.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">artificial intelligence.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud computing, SCADA, blockchain, smart grid, big data analytics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">communication.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computer science.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">electronics.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">pretty good privacy.</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">MLI ASEE STEM eBook-Package 2024</subfield><subfield code="z">9783111564340</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">MLI and ITGP STEM IT PACKAGE</subfield><subfield code="z">9783111574073</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Sciendo All Ebooks Trial Collection 2024</subfield><subfield code="z">9783111502496</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9781683928812</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9781683928836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781683928829</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9781683928829</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9781683928829/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-150249-6 Sciendo All Ebooks Trial Collection 2024</subfield><subfield code="b">2024</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-156434-0 MLI ASEE STEM eBook-Package 2024</subfield><subfield code="b">2024</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-157407-3 MLI and ITGP STEM IT PACKAGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield></record></collection> |