Cryptography and network security
This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chennai
Pearson
[2017]
|
Ausgabe: | [First edition]. |
Schriftenreihe: | Always learning
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104370467 | ||
003 | DE-627-1 | ||
005 | 20240701091201.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2017 xx |||||o 00| ||eng c | ||
020 | |a 9789332578814 |c electronic bk. |9 978-93-325-7881-4 | ||
020 | |a 9332578818 |c electronic bk. |9 93-325-7881-8 | ||
035 | |a (DE-627-1)104370467 | ||
035 | |a (DE-599)KEP104370467 | ||
035 | |a (ORHE)9789332578814 | ||
035 | |a (DE-627-1)104370467 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20240529 | |
100 | 1 | |a Bose, S. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |c S. Bose, P. Vijayakumar |
250 | |a [First edition]. | ||
264 | 1 | |a Chennai |b Pearson |c [2017] | |
300 | |a 1 online resource (545 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a Always learning | |
500 | |a Includes index | ||
520 | |a This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Coding theory | |
650 | 0 | |a Computer security | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Chiffrement (Informatique) | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Vijayakumar, P. |e VerfasserIn |4 aut | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9789332578814/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104370467 |
---|---|
_version_ | 1818767367868514304 |
adam_text | |
any_adam_object | |
author | Bose, S. Vijayakumar, P. |
author_facet | Bose, S. Vijayakumar, P. |
author_role | aut aut |
author_sort | Bose, S. |
author_variant | s b sb p v pv |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104370467 (DE-599)KEP104370467 (ORHE)9789332578814 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01996nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-104370467</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091201.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789332578814</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-93-325-7881-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9332578818</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">93-325-7881-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104370467</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9789332578814</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104370467</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240529</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bose, S.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="c">S. Bose, P. Vijayakumar</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chennai</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (545 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Always learning</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vijayakumar, P.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9789332578814/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104370467 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:46Z |
institution | BVB |
isbn | 9789332578814 9332578818 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (545 pages) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Pearson |
record_format | marc |
series2 | Always learning |
spelling | Bose, S. VerfasserIn aut Cryptography and network security S. Bose, P. Vijayakumar [First edition]. Chennai Pearson [2017] 1 online resource (545 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Always learning Includes index This book elaborates the basic and advanced concepts of cryptography and network security issues. It is user friendly since each is modelled with several case studies and illustration. All algorithms are explained with various algebraic structures to map the theoretical concepts of cryptography with modern algebra. Moreover, all the concepts are explained with the secure multicast communication scenarios that deal with one to many secure communications. Computer networks Security measures Data encryption (Computer science) Coding theory Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Chiffrement (Informatique) Sécurité informatique Vijayakumar, P. VerfasserIn aut TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9789332578814/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Bose, S. Vijayakumar, P. Cryptography and network security Computer networks Security measures Data encryption (Computer science) Coding theory Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Chiffrement (Informatique) Sécurité informatique |
title | Cryptography and network security |
title_auth | Cryptography and network security |
title_exact_search | Cryptography and network security |
title_full | Cryptography and network security S. Bose, P. Vijayakumar |
title_fullStr | Cryptography and network security S. Bose, P. Vijayakumar |
title_full_unstemmed | Cryptography and network security S. Bose, P. Vijayakumar |
title_short | Cryptography and network security |
title_sort | cryptography and network security |
topic | Computer networks Security measures Data encryption (Computer science) Coding theory Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Chiffrement (Informatique) Sécurité informatique |
topic_facet | Computer networks Security measures Data encryption (Computer science) Coding theory Computer security Réseaux d'ordinateurs ; Sécurité ; Mesures Chiffrement (Informatique) Sécurité informatique |
url | https://learning.oreilly.com/library/view/-/9789332578814/?ar |
work_keys_str_mv | AT boses cryptographyandnetworksecurity AT vijayakumarp cryptographyandnetworksecurity |