| 000 | 04719cam a2200469 i 4500 | ||
|---|---|---|---|
| 999 |
_c92559 _d92559 |
||
| 005 | 20250905095349.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 250905s2024 njum o u000 0 eng d | ||
| 020 | _a9781394207480 | ||
| 020 |
_a9781394207510 _qelectronic book |
||
| 020 |
_a1394207514 _qelectronic book |
||
| 020 |
_a1394207492 _qelectronic book |
||
| 020 |
_a9781394207503 _q(electronic bk.) |
||
| 020 |
_a1394207506 _q(electronic bk.) |
||
| 020 |
_a9781394207497 _q(electronic bk.) |
||
| 020 |
_z9781394207480 _qhardcover |
||
| 020 |
_z1394207484 _qhardcover |
||
| 024 | 7 |
_a10.1002/9781394207510 _2doi |
|
| 035 |
_a(OCoLC)1420039346 _z(OCoLC)1420630853 |
||
| 037 |
_a10444092 _bIEEE |
||
| 040 |
_aYDX _beng _erda _cYDX _dOCLCO _dEBLCP _dYDX _dOCLCQ _dOCLCO _dIEEEE _dN$T _dDG1 |
||
| 041 | _aeng | ||
| 050 | 0 | 4 |
_aQA268 _b.M34 2024 |
| 082 | 0 | 4 |
_a005.8/24 _223/eng/20240223 |
| 100 | 1 |
_aMammeri, Zoubir, _0https://id.loc.gov/authorities/names/n2002153613 _eauthor. |
|
| 245 | 1 | 0 |
_aCryptography : _balgorithms, protocols, and standards for computer security / _cZoubir Z Mammeri. |
| 264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, _c[2024] |
|
| 300 | _a1 online resource. | ||
| 336 |
_atext _btxt _2rdacontent. |
||
| 337 |
_acomputer _bc _2rdamedia. |
||
| 338 |
_aonline resource _bcr _2rdacarrier. |
||
| 340 |
_2rdacc _0http://rdaregistry.info/termList/RDAColourContent/1003. |
||
| 505 | 0 | _aIntroduction to Computer Security -- Introduction to Cryptography -- Mathematical Basics and Computation Algorithms for Cryptography -- Symmetric Ciphering: Historical Ciphers -- Hash Functions, Message Authentication Codes, and Digital Signature -- Stream Ciphers -- Block Ciphers: Basics, TDEA, and AES -- Block Cipher Modes of Operation for Confidentiality -- Block Cipher Modes of Operation for Authentication and Confidentiality -- Introduction to Security Analysis of Blocks Ciphers -- Introduction to Cryptanalysis Attacks on Symmetric Ciphers -- Public-key Cryptosystems: RSA and Finite Field Cryptography Based Schemes -- Public-key Cryptosystems: Elliptic Curve Cryptography -- Key Management -- Digital Certificate, Public-key Infrastructure, TLS, and Kerberos -- Generation of Pseudorandom and Prime Numbers for Cryptographic -- Applications. | |
| 520 | _aCryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols. | ||
| 545 | 0 | _aAbout the Author Zoubir Mammeri, PhD, is a Full Professor at Paul Sabatier University in Toulouse, France. He teaches a variety of computer science subjects. He has published extensively on cybersecurity and related subjects, and has served as expert and evaluator in research programs of the European Commission and the French National Research Agency on communication networks and their security. | |
| 650 | 0 |
_aCryptography. _0https://id.loc.gov/authorities/subjects/sh85034453. |
|
| 650 | 0 |
_aComputer security. _0https://id.loc.gov/authorities/subjects/sh90001862. |
|
| 655 | 4 | _aElectronic books. | |
| 856 |
_uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781394207510 _yFull text is available at Wiley Online Library Click here to view |
||
| 942 |
_2ddc _cER |
||