Computer security and cryptography:
Saved in:
Bibliographic Details
Main Author: Konheim, Alan G. (Author)
Format: Electronic eBook
Language:English
Published: Hoboken, N.J. Wiley-Interscience ©2007
Subjects:
Online Access:FAW01
FAW02
Volltext
Item Description:Includes bibliographical references and index
COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.
Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema
Physical Description:1 Online-Ressource (xvii, 521 pages)
ISBN:0470083972
0470083980
0471947830
9780470083970
9780470083987
9780471947837

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection! Get full text