Cargando…

Cryptography and network security /

This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptogra...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Bose, S. (Autor), Vijayakumar, P. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, [2016]
Colección:Always learning.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1006512475
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 171017s2016 xx a o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d COO  |d OCLCF  |d STF  |d OCLCA  |d UOK  |d CEF  |d KSU  |d VT2  |d OCLCA  |d WYU  |d C6I  |d UAB  |d ERF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
020 |a 9789332579125 
020 |a 9332579121 
029 1 |a GBVCP  |b 1014941253 
035 |a (OCoLC)1006512475 
037 |a CL0500000903  |b Safari Books Online 
050 4 |a TK5105.59 
082 1 4 |a [E] 
049 |a UAMI 
100 1 |a Bose, S.,  |e author. 
245 1 0 |a Cryptography and network security /  |c S. Bose, P. Vijayakumar. 
264 1 |a [Place of publication not identified] :  |b Pearson,  |c [2016] 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Always learning 
588 0 |a Online resource; title from title page (viewed October 17, 2017). 
500 |a Date of publication from resource descriptio page (Safari, viewed October 17, 2017). 
520 |a This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each chapter is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 6 |a Sécurité informatique. 
650 7 |a Coding theory  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Vijayakumar, P.,  |e author. 
830 0 |a Always learning. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9789332579125/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP