Fundamentals of Computer Security
Autor Josef Pieprzyk, Thomas Hardjono, Jennifer Seberryen Limba Engleză Paperback – dec 2010
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 405.62 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – dec 2010 | 405.62 lei 6-8 săpt. | |
Hardback (1) | 548.12 lei 6-8 săpt. | |
Springer Berlin, Heidelberg – 21 ian 2003 | 548.12 lei 6-8 săpt. |
Preț: 405.62 lei
Preț vechi: 507.01 lei
-20% Nou
Puncte Express: 608
Preț estimativ în valută:
77.64€ • 80.92$ • 64.63£
77.64€ • 80.92$ • 64.63£
Carte tipărită la comandă
Livrare economică 04-18 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642077135
ISBN-10: 3642077137
Pagini: 700
Ilustrații: XX, 677 p.
Dimensiuni: 170 x 244 x 37 mm
Greutate: 1.19 kg
Ediția:Softcover reprint of hardcover 1st ed. 2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642077137
Pagini: 700
Ilustrații: XX, 677 p.
Dimensiuni: 170 x 244 x 37 mm
Greutate: 1.19 kg
Ediția:Softcover reprint of hardcover 1st ed. 2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
Professional/practitionerCuprins
1 Introduction.- 2 Background Theory.- 3 Private-Key Cryptosystems.- 4 Public-Key Cryptosystems.- 5 Pseudorandomness.- 6 Hashing.- 7 Digital Signatures.- 8 Authentication.- 9 Secret Sharing.- 10 Group-Oriented Cryptography.- 11 Key Establishment Protocols.- 12 Zero-Knowledge Proof Systems.- 13 Identification.- 14 Intrusion Detection.- 15 Electronic Elections and Digital Money.- 16 Database Protection and Security.- 17 Access Control.- 18 Network Security.- References.
Recenzii
From the reviews:
"The goal of the book is to present the basic concepts in computer and network security. … It has 18 chapters, each … concluding with a set of exercises and problems. … the book overviews the most important topics of cryptography and some topics on computer security. It may be used for self-study, as well as a text for undergraduate and postgraduate courses." (Lenka Fibikova, Zentralblatt MATH, Issue 1011, 2003)
"The goal of the book is to present the basic concepts in computer and network security. … It has 18 chapters, each … concluding with a set of exercises and problems. … the book overviews the most important topics of cryptography and some topics on computer security. It may be used for self-study, as well as a text for undergraduate and postgraduate courses." (Lenka Fibikova, Zentralblatt MATH, Issue 1011, 2003)
Textul de pe ultima copertă
This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.
Caracteristici
Introduces all basic mathematical concepts necessary for further study of secure systems The concepts are presented clearly and illustrated by numerous examples The book can also be used as a reference to quickly learn about terms used in Computer Security Includes supplementary material: sn.pub/extras