Cybercryptography: Applicable Cryptography for Cyberspace Security
Autor Song Y. Yanen Limba Engleză Hardback – 21 ian 2019
Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Preț: 744.05 lei
Preț vechi: 930.07 lei
-20% Nou
Puncte Express: 1116
Preț estimativ în valută:
142.40€ • 150.23$ • 118.67£
142.40€ • 150.23$ • 118.67£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319725345
ISBN-10: 3319725343
Pagini: 441
Ilustrații: XI, 436 p. 104 illus.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.8 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319725343
Pagini: 441
Ilustrații: XI, 436 p. 104 illus.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.8 kg
Ediția:1st ed. 2019
Editura: Springer International Publishing
Colecția Springer
Locul publicării:Cham, Switzerland
Cuprins
1 Cyberspace and Cyberspace Security.- 2 Mathematical Preliminaries.- 3. Computational Preliminaries.- 4 Secret-Key Cryptography.- 5 Factoring-Based Cryptography.- 6 Logarithm-Based Cryptography.- 7 Elliptic Curve Cryptography.- 8 Quantum-Safe Cryptography.- 9 Offensive Cryptography.
Recenzii
“This is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it.” (Manish Gupta, Computing Reviews, May 03, 2019)
Caracteristici
Offers Unifying theory and practice Covers combining security-key and public-key techniques Discusses defensive and offensive cryptography Applicable to cyberspace security Accessible to a wide range of audiences