Cryptography and Security in Computing / / edited by Jaydip Sen.
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are d...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | [Place of publication not identified] : : IntechOpen,, 2012. |
Year of Publication: | 2012 |
Language: | English |
Physical Description: | 1 online resource (258 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545697404498 |
---|---|
ctrlnum |
(CKB)4970000000097751 (NjHacI)994970000000097751 (oapen)https://directory.doabooks.org/handle/20.500.12854/65707 (EXLCZ)994970000000097751 |
collection |
bib_alma |
record_format |
marc |
spelling |
Sen, Jaydip edt Cryptography and Security in Computing / edited by Jaydip Sen. IntechOpen 2012 [Place of publication not identified] : IntechOpen, 2012. 1 online resource (258 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022). Includes bibliographical references and index. The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities. English Computer networks. Cloud computing 953-51-0179-X Sen, Jaydip, editor. |
language |
English |
format |
eBook |
author2 |
Sen, Jaydip, |
author_facet |
Sen, Jaydip, |
author2_variant |
j s js j s js |
author2_role |
TeilnehmendeR |
title |
Cryptography and Security in Computing / |
spellingShingle |
Cryptography and Security in Computing / |
title_full |
Cryptography and Security in Computing / edited by Jaydip Sen. |
title_fullStr |
Cryptography and Security in Computing / edited by Jaydip Sen. |
title_full_unstemmed |
Cryptography and Security in Computing / edited by Jaydip Sen. |
title_auth |
Cryptography and Security in Computing / |
title_new |
Cryptography and Security in Computing / |
title_sort |
cryptography and security in computing / |
publisher |
IntechOpen IntechOpen, |
publishDate |
2012 |
physical |
1 online resource (258 pages) |
isbn |
953-51-5615-2 953-51-0179-X |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.5 C797 42012 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
004 - Data processing & computer science |
dewey-full |
004.6 |
dewey-sort |
14.6 |
dewey-raw |
004.6 |
dewey-search |
004.6 |
work_keys_str_mv |
AT senjaydip cryptographyandsecurityincomputing |
status_str |
n |
ids_txt_mv |
(CKB)4970000000097751 (NjHacI)994970000000097751 (oapen)https://directory.doabooks.org/handle/20.500.12854/65707 (EXLCZ)994970000000097751 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cryptography and Security in Computing / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1787548867379593216 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01004nam a2200289 i 4500</leader><controlfield tag="001">993545697404498</controlfield><controlfield tag="005">20221017090430.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">221017s2012 xx ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-5615-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000097751</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000097751</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/65707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000097751</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5</subfield><subfield code="b">.C797 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cryptography and Security in Computing /</subfield><subfield code="c">edited by Jaydip Sen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2012</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (258 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud computing</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">953-51-0179-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 20:36:59 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337971780004498&Force_direct=true</subfield><subfield code="Z">5337971780004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337971780004498</subfield></datafield></record></collection> |