The Good, the Bad, and the Hungry Sale
 
 

Recently Viewed clear list


Original Essays | July 24, 2014

Jessica Valenti: IMG Full Frontal Feminism Revisited



It is arguably the worst and best time to be a feminist. In the years since I first wrote Full Frontal Feminism, we've seen a huge cultural shift in... Continue »
  1. $11.90 Sale Trade Paper add to wish list

spacer
Qualifying orders ship free.
$108.50
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

Data Privacy and Security

by

Data Privacy and Security Cover

 

Synopses & Reviews

Publisher Comments:

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Table of Contents

PART I: Data Encryption: Monoalphabetic substitution cyphers * Transposition cyphers * Polyalphabetic substitution cyphers * Random numbers * The Enigma * Stream ciphers * Block ciphers * Public-Key Cryptography * Quantum cryptography PART: Data Hiding: * Data hiding in text * Data hiding in images * Other methods Appendixes: convolution * hashing * cyclic redundancy codes * Galois fields * Glossary * Index

Product Details

ISBN:
9781441918161
Author:
Salomon, David
Publisher:
Springer
Subject:
Security
Subject:
Data encryption.
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Coding and Information Theory An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use both information hiding techniques and encryption to protect digital data and have secure communica
Subject:
Networking-Computer Security
Subject:
Coding and Information Theory
Copyright:
Edition Description:
Softcover reprint of the original 1st ed. 2003
Publication Date:
20110701
Binding:
TRADE PAPER
Language:
English
Pages:
479
Dimensions:
235 x 178 mm

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » Security » Cryptography
Computers and Internet » Personal Computers » General
Engineering » Communications » Information Theory
Humanities » Philosophy » General

Data Privacy and Security New Trade Paper
0 stars - 0 reviews
$108.50 In Stock
Product details 479 pages Springer - English 9781441918161 Reviews:
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.