Cryptography and network security:
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Gistrup, Denmark
River Publishers
[2022]
|
Schriftenreihe: | River Publishers series in security and digital forensics
|
Schlagworte: | |
Zusammenfassung: | Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory |
Beschreibung: | xxiii, 297 Seiten Illustrationen, Diagramme |
ISBN: | 9788770042567 9788770224079 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV049929267 | ||
003 | DE-604 | ||
005 | 20250109 | ||
007 | t| | ||
008 | 241030s2022 xx a||| b||| 00||| eng d | ||
020 | |a 9788770042567 |c pbk |9 978-87-7004-256-7 | ||
020 | |a 9788770224079 |c hbk |9 978-87-7022-407-9 | ||
035 | |a (DE-599)BVBBV049929267 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Alencar, Marcelos S. |d 1957- |e Verfasser |0 (DE-588)1146738382 |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |c Marcelo Sampaio de Alencar |
264 | 1 | |a Gistrup, Denmark |b River Publishers |c [2022] | |
264 | 2 | |a London ; New york |b Routledge, Taylor & Francis Group | |
300 | |a xxiii, 297 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a River Publishers series in security and digital forensics | |
520 | 3 | |a Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory | |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Chiffrement (Informatique) | |
653 | 0 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
653 | 0 | |a Cryptographie | |
653 | 0 | |a COMPUTERS / Cryptography | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Cryptography | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-00-333776-8 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-10-0079-293-5 |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035267661 |
Datensatz im Suchindex
_version_ | 1820776446509973504 |
---|---|
adam_text | |
any_adam_object | |
author | Alencar, Marcelos S. 1957- |
author_GND | (DE-588)1146738382 |
author_facet | Alencar, Marcelos S. 1957- |
author_role | aut |
author_sort | Alencar, Marcelos S. 1957- |
author_variant | m s a ms msa |
building | Verbundindex |
bvnumber | BV049929267 |
ctrlnum | (DE-599)BVBBV049929267 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV049929267</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20250109</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">241030s2022 xx a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770042567</subfield><subfield code="c">pbk</subfield><subfield code="9">978-87-7004-256-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770224079</subfield><subfield code="c">hbk</subfield><subfield code="9">978-87-7022-407-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049929267</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alencar, Marcelos S.</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1146738382</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="c">Marcelo Sampaio de Alencar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup, Denmark</subfield><subfield code="b">River Publishers</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">London ; New york</subfield><subfield code="b">Routledge, Taylor & Francis Group</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 297 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">River Publishers series in security and digital forensics</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-00-333776-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-10-0079-293-5</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035267661</subfield></datafield></record></collection> |
id | DE-604.BV049929267 |
illustrated | Illustrated |
indexdate | 2025-01-09T13:02:12Z |
institution | BVB |
isbn | 9788770042567 9788770224079 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035267661 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xxiii, 297 Seiten Illustrationen, Diagramme |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | River Publishers |
record_format | marc |
series2 | River Publishers series in security and digital forensics |
spelling | Alencar, Marcelos S. 1957- Verfasser (DE-588)1146738382 aut Cryptography and network security Marcelo Sampaio de Alencar Gistrup, Denmark River Publishers [2022] London ; New york Routledge, Taylor & Francis Group xxiii, 297 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier River Publishers series in security and digital forensics Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory Data encryption (Computer science) Computer networks / Security measures Cryptography Chiffrement (Informatique) Réseaux d'ordinateurs / Sécurité / Mesures Cryptographie COMPUTERS / Cryptography Erscheint auch als Online-Ausgabe 978-1-00-333776-8 Erscheint auch als Online-Ausgabe 978-10-0079-293-5 |
spellingShingle | Alencar, Marcelos S. 1957- Cryptography and network security |
title | Cryptography and network security |
title_auth | Cryptography and network security |
title_exact_search | Cryptography and network security |
title_full | Cryptography and network security Marcelo Sampaio de Alencar |
title_fullStr | Cryptography and network security Marcelo Sampaio de Alencar |
title_full_unstemmed | Cryptography and network security Marcelo Sampaio de Alencar |
title_short | Cryptography and network security |
title_sort | cryptography and network security |
work_keys_str_mv | AT alencarmarceloss cryptographyandnetworksecurity |