UID:
almafu_9959327281902883
Format:
1 online resource (xvii, 521 pages) :
,
illustrations
ISBN:
9780470083970
,
0470083972
,
9780470083987
,
0470083980
Content:
Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.
Note:
COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.
Additional Edition:
Print version: Konheim, Alan G., 1934- Computer security and cryptography. Hoboken, N.J. : Wiley-Interscience, ©2007 ISBN 0471947830
Additional Edition:
ISBN 9780471947837
Language:
English
Keywords:
Electronic books.
;
Electronic books.
;
Electronic books.
;
Electronic books.
;
Electronic books.
;
Electronic books.
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/0470083980
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/0470083980
URL:
https://onlinelibrary.wiley.com/doi/book/10.1002/0470083980
Bookmarklink