Network Security and Cryptography:
Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in com...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Dulles, VA
Mercury Learning and Information
[2018]
|
Schlagworte: | |
Online-Zugang: | DE-1046 DE-1043 DE-858 DE-Aug4 DE-859 DE-860 DE-739 Volltext |
Zusammenfassung: | Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024) |
Beschreibung: | 1 Online-Ressource (560 Seiten) figures & tables throughout |
ISBN: | 9781683922933 |
DOI: | 10.1515/9781683922933 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV049627953 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240326s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781683922933 |9 978-1-68392-293-3 | ||
024 | 7 | |a 10.1515/9781683922933 |2 doi | |
035 | |a (ZDB-23-DGG)9781683922933 | ||
035 | |a (OCoLC)1429562055 | ||
035 | |a (DE-599)BVBBV049627953 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-1046 |a DE-858 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Musa, Sarhan M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Network Security and Cryptography |c Sarhan M. Musa |
264 | 1 | |a Dulles, VA |b Mercury Learning and Information |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (560 Seiten) |b figures & tables throughout | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024) | ||
520 | |a Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions | ||
546 | |a In English | ||
650 | 4 | |a IT Management & Security | |
650 | 4 | |a Protocols and Standards | |
650 | 4 | |a Software | |
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Cryptography | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781942270836 |
856 | 4 | 0 | |u https://doi.org/10.1515/9781683922933 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-1046 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-1043 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-858 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-Aug4 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-859 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-860 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1515/9781683922933 |l DE-739 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805082031274590208 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Musa, Sarhan M. |
author_facet | Musa, Sarhan M. |
author_role | aut |
author_sort | Musa, Sarhan M. |
author_variant | s m m sm smm |
building | Verbundindex |
bvnumber | BV049627953 |
classification_rvk | ST 276 |
collection | ZDB-23-DGG |
ctrlnum | (ZDB-23-DGG)9781683922933 (OCoLC)1429562055 (DE-599)BVBBV049627953 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1515/9781683922933 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV049627953</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240326s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781683922933</subfield><subfield code="9">978-1-68392-293-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9781683922933</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9781683922933</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1429562055</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049627953</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Musa, Sarhan M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Network Security and Cryptography</subfield><subfield code="c">Sarhan M. Musa</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Dulles, VA</subfield><subfield code="b">Mercury Learning and Information</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (560 Seiten)</subfield><subfield code="b">figures & tables throughout</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Management & Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protocols and Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781942270836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1515/9781683922933</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049627953 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:38:00Z |
indexdate | 2024-07-20T07:26:12Z |
institution | BVB |
isbn | 9781683922933 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034971838 |
oclc_num | 1429562055 |
open_access_boolean | |
owner | DE-1043 DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 |
owner_facet | DE-1043 DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 |
physical | 1 Online-Ressource (560 Seiten) figures & tables throughout |
psigel | ZDB-23-DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Mercury Learning and Information |
record_format | marc |
spelling | Musa, Sarhan M. Verfasser aut Network Security and Cryptography Sarhan M. Musa Dulles, VA Mercury Learning and Information [2018] © 2018 1 Online-Ressource (560 Seiten) figures & tables throughout txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from PDF title page (publisher's Web site, viewed 06. Mrz 2024) Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.FEATURES:• Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more• Features separate chapters on the mathematics related to network security and cryptography• Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security• Includes end of chapter review questions In English IT Management & Security Protocols and Standards Software COMPUTERS / Security / Networking bisacsh Computer networks Security measures Cryptography Erscheint auch als Druck-Ausgabe 9781942270836 https://doi.org/10.1515/9781683922933 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Musa, Sarhan M. Network Security and Cryptography IT Management & Security Protocols and Standards Software COMPUTERS / Security / Networking bisacsh Computer networks Security measures Cryptography |
title | Network Security and Cryptography |
title_auth | Network Security and Cryptography |
title_exact_search | Network Security and Cryptography |
title_exact_search_txtP | Network Security and Cryptography |
title_full | Network Security and Cryptography Sarhan M. Musa |
title_fullStr | Network Security and Cryptography Sarhan M. Musa |
title_full_unstemmed | Network Security and Cryptography Sarhan M. Musa |
title_short | Network Security and Cryptography |
title_sort | network security and cryptography |
topic | IT Management & Security Protocols and Standards Software COMPUTERS / Security / Networking bisacsh Computer networks Security measures Cryptography |
topic_facet | IT Management & Security Protocols and Standards Software COMPUTERS / Security / Networking Computer networks Security measures Cryptography |
url | https://doi.org/10.1515/9781683922933 |
work_keys_str_mv | AT musasarhanm networksecurityandcryptography |