Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography and Network Security (4th Edition)

Buy

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.

It is the purpose of this book to provide a practical survey of both the principles and practice of cryptography and network security. In the first two parts of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.

The subject, and therefore this book, draws on a variety of disciplines. In particular, it is impossible to appreciate the significance of some of the techniques discussed in this book without a basic understanding of number theory and some results from probability theory. Nevertheless, an attempt has been made to make the book self-contained. The book presents not only the basic mathematical results that are needed but provides the reader with an intuitive understanding of those results. Such background material is introduced as needed. This approach helps to motivate the material that is introduced, and the author considers this preferable to simply presenting all of the mathematical material in a lump at the beginning of the book.

(HTML tags aren't allowed.)

Programming Firefox: Building Rich Internet Applications with XUL
Programming Firefox: Building Rich Internet Applications with XUL
This is your guide to building Internet applications and user interfaces with the Mozilla component framework, which is best known for the Firefox web browser and Thunderbird email client. Programming Firefox demonstrates how to use the XML User Interface Language (XUL) with open source tools in the framework's Cross-Platform Component...
Agile IT Security Implementation Methodology
Agile IT Security Implementation Methodology

Agile methodologies attack risk at its core. To identify risk early and often is the premise of agile security. Risk comes in many forms. Organizations face security threats every day. Risks are in the delivery and maintenance of the countermeasures. Agile IT Security focuses on the details of the steps in delivering and maintaining...

Immunology and Evolution of Infectious Disease
Immunology and Evolution of Infectious Disease

From HIV to influenza, the battle between infectious agents and the immune system is at the heart of disease. Knowledge of how and why parasites vary to escape recognition by the immune system is central to vaccine design, the control of epidemics, and our fundamental understanding of parasite ecology and evolution. As the first comprehensive...


Queenpins: Notorious Women Gangsters of The Modern Era
Queenpins: Notorious Women Gangsters of The Modern Era

The cut throat world of organized crime has long been dominated by men, and such macho godfathers and kingpins as Al Capone, John Dillinger, Pablo Escobar and John Gotti have become legendary. Yet, dig deep into the annals of crime and one can find smart, ambitious and ruthless women who have cracked the glass ceiling of the underworld and...

Pro Business Applications with Silverlight 5 (Professional Apress)
Pro Business Applications with Silverlight 5 (Professional Apress)
Silverlight is a web-based platform from Microsoft that can be used to build Rich Internet Applications (RIAs). Of the many new possibilities it enables, one of its key focuses is as a platform for building business applications. Community support for the technology has been overwhelmingly positive, and Microsoft has gone on to use...
JasperReports: Reporting for Java Developers
JasperReports: Reporting for Java Developers
JasperReports is the world's most popular embeddable Java open source reporting library, providing Java developers with the power to easily create rich print and web reports. This book shows you exactly how to get started, and develop the skills to get the most from JasperReports. The book steers you through each point of report setup, to creating,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy