Cryptography and Security in Computing / / edited by Jaydip Sen.

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are d...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : IntechOpen,, 2012.
Year of Publication:2012
Language:English
Physical Description:1 online resource (258 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545697404498
ctrlnum (CKB)4970000000097751
(NjHacI)994970000000097751
(oapen)https://directory.doabooks.org/handle/20.500.12854/65707
(EXLCZ)994970000000097751
collection bib_alma
record_format marc
spelling Sen, Jaydip edt
Cryptography and Security in Computing / edited by Jaydip Sen.
IntechOpen 2012
[Place of publication not identified] : IntechOpen, 2012.
1 online resource (258 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022).
Includes bibliographical references and index.
The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.
English
Computer networks.
Cloud computing
953-51-0179-X
Sen, Jaydip, editor.
language English
format eBook
author2 Sen, Jaydip,
author_facet Sen, Jaydip,
author2_variant j s js
j s js
author2_role TeilnehmendeR
title Cryptography and Security in Computing /
spellingShingle Cryptography and Security in Computing /
title_full Cryptography and Security in Computing / edited by Jaydip Sen.
title_fullStr Cryptography and Security in Computing / edited by Jaydip Sen.
title_full_unstemmed Cryptography and Security in Computing / edited by Jaydip Sen.
title_auth Cryptography and Security in Computing /
title_new Cryptography and Security in Computing /
title_sort cryptography and security in computing /
publisher IntechOpen
IntechOpen,
publishDate 2012
physical 1 online resource (258 pages)
isbn 953-51-5615-2
953-51-0179-X
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.5 C797 42012
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 004 - Data processing & computer science
dewey-full 004.6
dewey-sort 14.6
dewey-raw 004.6
dewey-search 004.6
work_keys_str_mv AT senjaydip cryptographyandsecurityincomputing
status_str n
ids_txt_mv (CKB)4970000000097751
(NjHacI)994970000000097751
(oapen)https://directory.doabooks.org/handle/20.500.12854/65707
(EXLCZ)994970000000097751
carrierType_str_mv cr
is_hierarchy_title Cryptography and Security in Computing /
author2_original_writing_str_mv noLinkedField
_version_ 1787548867379593216
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01004nam a2200289 i 4500</leader><controlfield tag="001">993545697404498</controlfield><controlfield tag="005">20221017090430.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">221017s2012 xx ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">953-51-5615-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4970000000097751</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994970000000097751</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/65707</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994970000000097751</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.5</subfield><subfield code="b">.C797 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cryptography and Security in Computing /</subfield><subfield code="c">edited by Jaydip Sen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">IntechOpen</subfield><subfield code="c">2012</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">IntechOpen,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (258 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (InTech, viewed October 17, 2022).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cloud computing</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">953-51-0179-X</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sen, Jaydip,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-02-22 20:36:59 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2019-04-13 22:04:18 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337971780004498&amp;Force_direct=true</subfield><subfield code="Z">5337971780004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337971780004498</subfield></datafield></record></collection>