ISBN13: | 9788770042567 |
ISBN10: | 877004256X |
Kötéstípus: | Puhakötés |
Terjedelem: | 322 oldal |
Méret: | 234x156 mm |
Súly: | 594 g |
Nyelv: | angol |
Illusztrációk: | 58 Illustrations, black & white |
689 |
A matematika alapjai, matematikai logika
Számítógép architektúrák, logikai tervezés
Számítógépes hálózatok általában
Adatvédelem, adatbiztonság
A számítástechnika biztonsági és egészségügyi vonatkozásai
A matematika alapjai, matematikai logika (karitatív célú kampány)
Számítógép architektúrák, logikai tervezés (karitatív célú kampány)
Számítógépes hálózatok általában (karitatív célú kampány)
Adatvédelem, adatbiztonság (karitatív célú kampány)
A számítástechnika biztonsági és egészségügyi vonatkozásai (karitatív célú kampány)
Cryptography and Network Security
GBP 49.99
Kattintson ide a feliratkozáshoz
A Prosperónál jelenleg nincsen raktáron.
This book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the topic the book includes information about basic hacker attacks, alternatives to prevent attacks, ways to increase data protection and how to set up and implement secure protocols.
Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. The basics of information theory, how to measure information, and the information associated with a source are discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. Appendices include a review of probability theory, a discussion of cryptoalgorithms and cryptosystems, and a glossary of information security terms. Illustrations and graphics help the reader understand the theory.
1. Introduction 2. Main Definitions 3. Information Theory 4. Source Coding 5. Information Transmission and Channel Capacity 6. Computer Networks 7. Network Protocols and Architecture 8. The TCP/IP Protocol 9. Network Security 10. Theoretical Cryptography 11. The Hash Function 12. Criminal Cases