Security of information and communication networks, Part 1:
Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2010
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781424461813 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477102 | ||
003 | DE-604 | ||
005 | 20220218 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781424461813 |9 978-1-4244-6181-3 | ||
035 | |a (ZDB-37-ICG)EDP164 | ||
035 | |a (OCoLC)1269390163 | ||
035 | |a (DE-599)BVBBV047477102 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 652.8 |2 23 | |
100 | 1 | |a Kartalopoulos, Stamatios V. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security of information and communication networks, Part 1 |c Stamatios Kartalopoulos |
264 | 1 | |a United States |b IEEE |c 2010 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020) | ||
520 | |a Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Photonics | |
650 | 4 | |a Quantum entanglement | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878663 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP164 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP164 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793058516992 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Kartalopoulos, Stamatios V. |
author_facet | Kartalopoulos, Stamatios V. |
author_role | aut |
author_sort | Kartalopoulos, Stamatios V. |
author_variant | s v k sv svk |
building | Verbundindex |
bvnumber | BV047477102 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP164 (OCoLC)1269390163 (DE-599)BVBBV047477102 |
dewey-full | 652.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652.8 |
dewey-search | 652.8 |
dewey-sort | 3652.8 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03006nmm a2200385zc 4500</leader><controlfield tag="001">BV047477102</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220218 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781424461813</subfield><subfield code="9">978-1-4244-6181-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP164</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269390163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477102</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kartalopoulos, Stamatios V.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security of information and communication networks, Part 1</subfield><subfield code="c">Stamatios Kartalopoulos</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Photonics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Quantum entanglement</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878663</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP164</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP164</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477102 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:11Z |
institution | BVB |
isbn | 9781424461813 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878663 |
oclc_num | 1269390163 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | IEEE |
record_format | marc |
spelling | Kartalopoulos, Stamatios V. Verfasser aut Security of information and communication networks, Part 1 Stamatios Kartalopoulos United States IEEE 2010 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 12, 2020) Course content reaffirmed: 06/2015--The delivery of private or secret messages has been an issue of concern regardless of method of transport. Since antiquity, it was risky to send a message with a messenger without compromise. As a result, certain methods were developed to assure unintelligibility of a message if in enemy hands or to indicate to the rightful recipient that the message has been compromised or not. In our modern era, most messages and private data are transported over the communications network, which unfortunately is not immune to eavesdroppers, malicious attackers, impersonators and in general to bad actors who, with sophisticated methods access the network and harvest or destroy electronic data. In recent years, government and private industry worldwide are witnessing with concern an alarming increase in such malicious acts that aim to harvest information, destroy or alter files, or impersonate a source In this tutorial we provide an Introduction and a quick historical perspective on information security. Next, we describe key definitions that are useful in cryptography and information integrity, as well as in Network security. We provide a quick and over simplified mathematical background which is useful to understand the complexity of cryptographic algorithms. For example, what Prime Numbers are, what Modulus arithmetic is and how it works, and what the Greatest Common Divisor is and how it is calculated. The tutorial concludes with the description of popular Symmetric and Asymmetric Ciphers, such as the RSC, DES, AES, RC4, ECC, RSA, D-H, Merkle, and Shamir Cryptography Photonics Quantum entanglement (DE-588)4017102-4 Film gnd-content |
spellingShingle | Kartalopoulos, Stamatios V. Security of information and communication networks, Part 1 Cryptography Photonics Quantum entanglement |
subject_GND | (DE-588)4017102-4 |
title | Security of information and communication networks, Part 1 |
title_auth | Security of information and communication networks, Part 1 |
title_exact_search | Security of information and communication networks, Part 1 |
title_exact_search_txtP | Security of information and communication networks, Part 1 |
title_full | Security of information and communication networks, Part 1 Stamatios Kartalopoulos |
title_fullStr | Security of information and communication networks, Part 1 Stamatios Kartalopoulos |
title_full_unstemmed | Security of information and communication networks, Part 1 Stamatios Kartalopoulos |
title_short | Security of information and communication networks, Part 1 |
title_sort | security of information and communication networks part 1 |
topic | Cryptography Photonics Quantum entanglement |
topic_facet | Cryptography Photonics Quantum entanglement Film |
work_keys_str_mv | AT kartalopoulosstamatiosv securityofinformationandcommunicationnetworkspart1 |