HOME > 상세정보

상세정보

Data privacy and security

Data privacy and security

자료유형
단행본
개인저자
Salomon, D. (David), 1938-.
서명 / 저자사항
Data privacy and security / David Salomon.
발행사항
New York :   Springer,   2003.  
형태사항
xiv, 465 p. : ill. ; 24 cm.
총서사항
Springer professional computing
ISBN
0387003118 (alk. paper)
서지주기
Includes bibliographical references (p. [442]-451) and index.
일반주제명
Computer security. Data encryption (Computer science) Data protection.
000 00912camuu22002654a 4500
001 000045145082
005 20050113105559
008 050112s2003 nyua b 001 0 eng
020 ▼a 0387003118 (alk. paper)
040 ▼a DLC ▼c DLC ▼d DLC ▼d 244002
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b S265 2003
082 0 0 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b S174d
100 1 ▼a Salomon, D. ▼q (David), ▼d 1938-.
245 1 0 ▼a Data privacy and security / ▼c David Salomon.
260 ▼a New York : ▼b Springer, ▼c 2003.
300 ▼a xiv, 465 p. : ▼b ill. ; ▼c 24 cm.
440 0 ▼a Springer professional computing
504 ▼a Includes bibliographical references (p. [442]-451) and index.
650 0 ▼a Computer security.
650 0 ▼a Data encryption (Computer science)
650 0 ▼a Data protection.

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 세종학술정보원/과학기술실(5층)/ 청구기호 005.8 S174d 등록번호 151170573 도서상태 대출가능 반납예정일 예약 서비스 B M ?

컨텐츠정보

책소개

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.



Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.




정보제공 : Aladin

목차

PART I: Data Encryption: Monoalphabetic substitution cyphers * Transposition cyphers * Polyalphabetic substitution cyphers * Random numbers * The Enigma * Stream ciphers * Block ciphers * Public-Key Cryptography * Quantum cryptography PART: Data Hiding: * Data hiding in text * Data hiding in images * Other methods Appendixes: convolution * hashing * cyclic redundancy codes * Galois fields * Glossary * Index


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)