Cargando…

Computer security and encryption : an introduction /

Designed to meet the needs of beginners as well as more advanced readers, this book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Chauhan, S. R. (Autor), Jangra, S. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Dulles, Virginia : Mercury Learning and Information, [2020]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 KNOVEL_on1266170866
003 OCoLC
005 20231027140348.0
006 m o d
007 cr cnu---unuuu
008 210830s2020 vaua o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d OCLCO  |d UKAHL  |d K6U  |d OCLCF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d UPM  |d OCLCQ  |d SFB  |d DEGRU  |d OCLCO 
019 |a 1235959910  |a 1290065039  |a 1373454858  |a 1396858234  |a 1397418781 
020 |a 9781683925309  |q (electronic bk.) 
020 |a 1683925300  |q (electronic bk.) 
020 |a 9781683925293  |q (e-book) 
020 |a 1683925297 
020 |z 9781683925316 
020 |z 1683925319 
020 |a 1523147288 
020 |a 9781523147281 
035 |a (OCoLC)1266170866  |z (OCoLC)1235959910  |z (OCoLC)1290065039  |z (OCoLC)1373454858  |z (OCoLC)1396858234  |z (OCoLC)1397418781 
050 4 |a TK5105.59  |b .C43 2020eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Chauhan, S. R.,  |e author. 
245 1 0 |a Computer security and encryption :  |b an introduction /  |c S.R. Chauhan & S. Jangra. 
264 1 |a Dulles, Virginia :  |b Mercury Learning and Information,  |c [2020] 
300 |a 1 online resource (xx, 350 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a Designed to meet the needs of beginners as well as more advanced readers, this book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. --  |c Edited summary from book. 
505 0 0 |t Frontmatter --  |t CONTENTS --  |t Preface --  |t Chapter 1: Security Concepts --  |t Chapter 2: Public Key Cryptography and SSL --  |t Chapter 3: World Wide Web Transaction Security --  |t Chapter 4: IP Security and Firewalls --  |t Chapter 5: Public Key Certificates --  |t Chapter 6: Security at the IP Layer --  |t Chapter 7: Remote Access with Internet Protocol Security --  |t Chapter 8: Virtual Private Networks --  |t Chapter 9: The Security of Emerging Technologies --  |t Index 
590 |a Knovel  |b ACADEMIC - General Engineering & Project Administration 
590 |a Knovel  |b ACADEMIC - Software Engineering 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS / Security / General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Jangra, S.,  |e author. 
776 0 8 |i Print version:  |a Chauhan, S.R.  |t Computer security and encryption.  |d Dulles, Virginia : Mercury Learning and Information, [2020]  |z 9781683925316  |w (DLC) 2020939905  |w (OCoLC)1158580757 
856 4 0 |u https://appknovel.uam.elogim.com/kn/resources/kpCSEAI002/toc  |z Texto completo 
938 |a De Gruyter  |b DEGR  |n 9781683925293 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38151565 
938 |a Askews and Holts Library Services  |b ASKH  |n AH38148617 
938 |a EBSCOhost  |b EBSC  |n 2681805 
994 |a 92  |b IZTAP