NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Computer security and cryptography / Alan G. Konheim.

By: Material type: TextPublication details: Hoboken, N.J. : Wiley-Interscience, �2007.Description: 1 online resource (xvii, 521 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780470083970
  • 0470083972
  • 9780470083987
  • 0470083980
Subject(s): Additional physical formats: Print version:: Computer security and cryptography.DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 K638 2007eb
Online resources:
Contents:
COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.
Summary: Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.

Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.

Print version record.

Copyright � Wiley-Interscience 2007

John Wiley and Sons Wiley Online Library: Complete oBooks

There are no comments on this title.

to post a comment.