Home | Looking for something? Sign In | New here? Sign Up | Log out

Wednesday, October 21

Computer Security and Cryptography

Computer Security and Cryptography by Alan G. Konheim (Hardcover - Jan 29, 2007)

Updates readers of this book with all the tools, techniques and concepts needed to understand and implement data security systems. A wide range of topics for a thorough understanding of the factors affecting the efficiency of confidentiality, authentication, and digital signature scheme. Most importantly, readers gain hands-on experience in cryptanalysis and learn to create effective cryptographic systems.

The author participated in the design and analysis of the Data Encryption Standard (DES), a widely used symmetric encryption algorithm key. Its recommendations are based on firsthand experience of what works and does not work.

Comprehensive in its coverage, the book begins with an analysis of the history of cryptography, including a description of the basic encryption systems and many of the encryption systems used in the twentieth century. Then the author analyzes the theory of symmetric and public key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn from the practical limitations of the technology. The book ends with two chapters that explore a wide range of applications of cryptography.

Three basic types of chapters are featured to facilitate learning:
  • Chapters that develop technical skills
  • Chapters that describe a cryptosystem and present a method of analysis
  • Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
With consumers increasingly wary of identity theft and companies struggling to develop safety, security systems, this book is essential reading for professionals in electronic commerce and information technology. Written by a professor who teaches cryptography, also ideal for students.

Computer Security And Cryptography.pdf

0 Comments
Tweets
Responds

0 comments:

Post a Comment

.
Download by Label:
Recent Posts

Popular Posts

Now you can Download Wheel of Time series Full By Robert Jordan with these specified Prequel 1 - The Strike at Shayol Ghul Prequel 2 - Ne...

Robotics: Science and Systems IV 336 pages | The MIT Press (August 31, 2009) | 0262513099 | PDF | 12 Mb Robotics: Science and Systems IV s...

Linda S. Costanszo : Physiology Board Review Series Publisher: Lippincott Williams & Wilkins | 4st edition | ISBN: 0683303961 | 1998 | P...

In this tutorial you will learn how to crack any type of software protection using W32Dasm and HIEW. IDENTIFYING THE PROTECTION: Run the pro...

Muthu Ramachandran, Rogerio Atem de Carvalho, "Handbook of Research on Software Engineering and Productivity Technologies: Implications...

Best Seller Ebook