Computer Security and Cryptography

Computer Security and Cryptography
Author :
Publisher : John Wiley & Sons
Total Pages : 541
Release :
ISBN-10 : 9780470083970
ISBN-13 : 0470083972
Rating : 4/5 (972 Downloads)

Book Synopsis Computer Security and Cryptography by : Alan G. Konheim

Download or read book Computer Security and Cryptography written by Alan G. Konheim and published by John Wiley & Sons. This book was released on 2007-03-07 with total page 541 pages. Available in PDF, EPUB and Kindle. Book excerpt: Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work. Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications. Three basic types of chapters are featured to facilitate learning: Chapters that develop technical skills Chapters that describe a cryptosystem and present a method of analysis Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.


Computer Security and Cryptography Related Books

Computer Security and Cryptography
Language: en
Pages: 541
Authors: Alan G. Konheim
Categories: Computers
Type: BOOK - Published: 2007-03-07 - Publisher: John Wiley & Sons

GET EBOOK

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to
Cryptography and Data Security
Language: en
Pages: 422
Authors: Dorothy Elizabeth Robling Denning
Categories: History
Type: BOOK - Published: 1982 - Publisher: Addison Wesley Publishing Company

GET EBOOK

Encryption algorithms. Cryptographic technique. Access controls. Information controls. Inference controls.
Communication System Security
Language: en
Pages: 752
Authors: Lidong Chen
Categories: Computers
Type: BOOK - Published: 2012-05-29 - Publisher: CRC Press

GET EBOOK

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles t
Encyclopedia of Cryptography and Security
Language: en
Pages: 1457
Authors: Henk C.A. van Tilborg
Categories: Computers
Type: BOOK - Published: 2014-07-08 - Publisher: Springer Science & Business Media

GET EBOOK

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the
Cryptography: The Key to Digital Security, How It Works, and Why It Matters
Language: en
Pages: 267
Authors: Keith Martin
Categories: Computers
Type: BOOK - Published: 2020-05-19 - Publisher: W. W. Norton & Company

GET EBOOK

A “must-read” (Vincent Rijmen) nuts-and-bolts explanation of cryptography from a leading expert in information security. Despite its reputation as a languag