Cryptography and network security

This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bose, S. (VerfasserIn), Vijayakumar, P. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Chennai Pearson [2017]
Ausgabe:[First edition].
Schriftenreihe:Always learning
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002 4500
001 ZDB-30-ORH-104370467
003 DE-627-1
005 20240701091201.0
007 cr uuu---uuuuu
008 240701s2017 xx |||||o 00| ||eng c
020 |a 9789332578814  |c electronic bk.  |9 978-93-325-7881-4 
020 |a 9332578818  |c electronic bk.  |9 93-325-7881-8 
035 |a (DE-627-1)104370467 
035 |a (DE-599)KEP104370467 
035 |a (ORHE)9789332578814 
035 |a (DE-627-1)104370467 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240529 
100 1 |a Bose, S.  |e VerfasserIn  |4 aut 
245 1 0 |a Cryptography and network security  |c S. Bose, P. Vijayakumar 
250 |a [First edition]. 
264 1 |a Chennai  |b Pearson  |c [2017] 
300 |a 1 online resource (545 pages)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a Always learning 
500 |a Includes index 
520 |a This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications. 
650 0 |a Computer networks  |x Security measures 
650 0 |a Data encryption (Computer science) 
650 0 |a Coding theory 
650 0 |a Computer security 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Chiffrement (Informatique) 
650 4 |a Sécurité informatique 
700 1 |a Vijayakumar, P.  |e VerfasserIn  |4 aut 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9789332578814/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-104370467
_version_ 1818767367868514304
adam_text
any_adam_object
author Bose, S.
Vijayakumar, P.
author_facet Bose, S.
Vijayakumar, P.
author_role aut
aut
author_sort Bose, S.
author_variant s b sb
p v pv
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)104370467
(DE-599)KEP104370467
(ORHE)9789332578814
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition [First edition].
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01996nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-104370467</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091201.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789332578814</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-93-325-7881-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9332578818</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">93-325-7881-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104370467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9789332578814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370467</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240529</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bose, S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="c">S. Bose, P. Vijayakumar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chennai</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (545 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Always learning</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vijayakumar, P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9789332578814/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-104370467
illustrated Illustrated
indexdate 2024-12-18T08:48:46Z
institution BVB
isbn 9789332578814
9332578818
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (545 pages) illustrations
psigel ZDB-30-ORH
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Pearson
record_format marc
series2 Always learning
spelling Bose, S. VerfasserIn aut
Cryptography and network security S. Bose, P. Vijayakumar
[First edition].
Chennai Pearson [2017]
1 online resource (545 pages) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Always learning
Includes index
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.
Computer networks Security measures
Data encryption (Computer science)
Coding theory
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Chiffrement (Informatique)
Sécurité informatique
Vijayakumar, P. VerfasserIn aut
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9789332578814/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Bose, S.
Vijayakumar, P.
Cryptography and network security
Computer networks Security measures
Data encryption (Computer science)
Coding theory
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Chiffrement (Informatique)
Sécurité informatique
title Cryptography and network security
title_auth Cryptography and network security
title_exact_search Cryptography and network security
title_full Cryptography and network security S. Bose, P. Vijayakumar
title_fullStr Cryptography and network security S. Bose, P. Vijayakumar
title_full_unstemmed Cryptography and network security S. Bose, P. Vijayakumar
title_short Cryptography and network security
title_sort cryptography and network security
topic Computer networks Security measures
Data encryption (Computer science)
Coding theory
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Chiffrement (Informatique)
Sécurité informatique
topic_facet Computer networks Security measures
Data encryption (Computer science)
Coding theory
Computer security
Réseaux d'ordinateurs ; Sécurité ; Mesures
Chiffrement (Informatique)
Sécurité informatique
url https://learning.oreilly.com/library/view/-/9789332578814/?ar
work_keys_str_mv AT boses cryptographyandnetworksecurity
AT vijayakumarp cryptographyandnetworksecurity