Network Security and Cryptography
Autor Sarhan M. Musaen Limba Engleză Paperback – 11 oct 2022
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Paperback (2) | 267.40 lei 3-5 săpt. | |
| Mercury Learning & Information – 27 iul 2016 | 267.40 lei 3-5 săpt. | |
| Mercury Learning and Information – 11 oct 2022 | 333.82 lei 3-5 săpt. |
Preț: 333.82 lei
Preț vechi: 417.27 lei
-20% Nou
Puncte Express: 501
Preț estimativ în valută:
59.07€ • 68.89$ • 51.87£
59.07€ • 68.89$ • 51.87£
Carte disponibilă
Livrare economică 26 decembrie 25 - 09 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781683928836
ISBN-10: 1683928830
Pagini: 610
Dimensiuni: 178 x 229 x 33 mm
Greutate: 1.02 kg
Ediția:2. Auflage
Editura: Mercury Learning and Information
ISBN-10: 1683928830
Pagini: 610
Dimensiuni: 178 x 229 x 33 mm
Greutate: 1.02 kg
Ediția:2. Auflage
Editura: Mercury Learning and Information
Notă biografică
Musa Sarhan M. : Sarhan M. Musa holds a PhD in electrical engineering and is currently a professor in the electrical and computer engineering department at Prairie View A&M University, Texas.
Cuprins
1. Overview of Computer Networks
2. Mathematical Foundations for Computer Networks
3. Overview of Cryptography
4. Mathematical Foundations for Cryptography
5. Classical Cipher Schemes
6. Modern Symmetric Ciphers
7. Public-Key Cryptography for Data Confidentiality
8. Authentication Schemes
9. Centralized Authentication Service
10. Public Key Infrastructure
11. Pretty Good Privacy
12. Internet Security Services
13. System Security
14. Security of Emerging Technology
15: Artificial Intelligence Security
Bibliography
Index
2. Mathematical Foundations for Computer Networks
3. Overview of Cryptography
4. Mathematical Foundations for Cryptography
5. Classical Cipher Schemes
6. Modern Symmetric Ciphers
7. Public-Key Cryptography for Data Confidentiality
8. Authentication Schemes
9. Centralized Authentication Service
10. Public Key Infrastructure
11. Pretty Good Privacy
12. Internet Security Services
13. System Security
14. Security of Emerging Technology
15: Artificial Intelligence Security
Bibliography
Index