Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography and Network Security (4th Edition)

Buy

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.

As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.

It is the purpose of this book to provide a practical survey of both the principles and practice of cryptography and network security. In the first two parts of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security.

The subject, and therefore this book, draws on a variety of disciplines. In particular, it is impossible to appreciate the significance of some of the techniques discussed in this book without a basic understanding of number theory and some results from probability theory. Nevertheless, an attempt has been made to make the book self-contained. The book presents not only the basic mathematical results that are needed but provides the reader with an intuitive understanding of those results. Such background material is introduced as needed. This approach helps to motivate the material that is introduced, and the author considers this preferable to simply presenting all of the mathematical material in a lump at the beginning of the book.

(HTML tags aren't allowed.)

Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
Spatial Analysis, GIS and Remote Sensing: Applications in the Health Sciences
This new book explores the rapidly expanding applications of spatial analysis, GIS and remote sensing in the health sciences, and medical geography. For the practitioner or researcher this book is full of useful techniques if your work applies to environmental and public health, biostatistics, epidemiology, health services, medical geography,...
More iPhone 3 Development: Tackling iPhone SDK 3 (Beginning)
More iPhone 3 Development: Tackling iPhone SDK 3 (Beginning)

Interested in iPhone development? Want to learn more? Whether you’re a self-taught iPhone development genius or have just made your way through the pages of Beginning iPhone 3 Development, we have the perfect book for you.

More iPhone 3 Development: Tackling iPhone SDK 3 digs deeper into Apple’s latest SDK.
...
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
Rule Based Expert Systems: The Mycin Experiments of the Stanford Heuristic Programming Project
The last seven years have seen the field of artificial intelligence (AI) transformed. This transformation is not simple, nor has it yet run its course. The transformation has been generated by the emergence of expert systems. Whatever exactly these are or turn out to be, they first arose during the 1970s, with a triple claim: to be AI systems that...

Network Warrior
Network Warrior

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very...

Sun Tzu: Strategies for Marketing - 12 Essential Principles for Winning the War for Customers
Sun Tzu: Strategies for Marketing - 12 Essential Principles for Winning the War for Customers

Battle-tested strategies for marketing your product or service to victory!

Millions of business warriors have been inspired by lessons from one of the world's greatest strategists, Sun Tzu. In Sun Tzu Strategies for Winning the Marketing War, the bestselling author and Sun Tzu expert Gerald Michaelson interprets...

Active Directory Domain Services 2008 How-To
Active Directory Domain Services 2008 How-To

Need fast, reliable, easy-to-implement solutions for Microsoft Active Directory 2008? This book delivers exactly what you’re looking for. You’ll find nearly 250 tested, step-by-step procedures for planning, installing, customizing, and managing Active Directory Domain Services (AD DS) in any production...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy