Data Privacy and Security [electronic resource] /

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Saved in:
Bibliographic Details
Main Authors: Salomon, David. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: New York, NY : Springer New York : Imprint: Springer, 2003
Subjects:Computer science., Data structures (Computer science)., Data encryption (Computer science)., Coding theory., Computer Science., Data Encryption., Data Structures, Cryptology and Information Theory., Coding and Information Theory.,
Online Access:http://dx.doi.org/10.1007/978-0-387-21707-9
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:204964
record_format koha
spelling KOHA-OAI-TEST:2049642018-07-30T23:34:00ZData Privacy and Security [electronic resource] / Salomon, David. author. SpringerLink (Online service) textNew York, NY : Springer New York : Imprint: Springer,2003.engCovering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.Basic Concepts -- The Caesar Cipher -- The Affine Cipher -- The One-Time Pad -- Kerckhoffs’ Principle -- I. Data Encryption -- 1 Monoalphabetic Substitution Ciphers -- 2 Transposition Ciphers -- 3 Polyalphabetic Substitution Ciphers -- 4 Random Numbers -- 5 The Enigma -- 6 Stream Ciphers -- 7 Block Ciphers -- 8 Public-Key Cryptography -- 9 Quantum Cryptography -- II. Data Hiding -- 10 Data Hiding in Text -- 11 Data Hiding in Images -- 12 Data Hiding: Other Methods -- III. Essential Resources -- Appendixes -- A Convolution -- A.1 One-Dimensional Convolution -- A.2 Two-Dimensional Convolution -- B Hashing -- B.1 Hash Tables -- B.2 Hash Functions -- B.3 Collision Handling -- B.4 Secure Hash Functions -- C Cyclic Redundancy Codes -- D Galois Fields -- D.1 Field Definitions and Operations -- D.2 GF(256) and Rijndael -- D.3 Polynomial Arithmetic -- Answers to Exercises -- Cryptography Timeline.Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.Computer science.Data structures (Computer science).Data encryption (Computer science).Coding theory.Computer Science.Data Encryption.Data Structures, Cryptology and Information Theory.Coding and Information Theory.Springer eBookshttp://dx.doi.org/10.1007/978-0-387-21707-9URN:ISBN:9780387217079
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Computer science.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
spellingShingle Computer science.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Computer science.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Salomon, David. author.
SpringerLink (Online service)
Data Privacy and Security [electronic resource] /
description Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.
format Texto
topic_facet Computer science.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
author Salomon, David. author.
SpringerLink (Online service)
author_facet Salomon, David. author.
SpringerLink (Online service)
author_sort Salomon, David. author.
title Data Privacy and Security [electronic resource] /
title_short Data Privacy and Security [electronic resource] /
title_full Data Privacy and Security [electronic resource] /
title_fullStr Data Privacy and Security [electronic resource] /
title_full_unstemmed Data Privacy and Security [electronic resource] /
title_sort data privacy and security [electronic resource] /
publisher New York, NY : Springer New York : Imprint: Springer,
publishDate 2003
url http://dx.doi.org/10.1007/978-0-387-21707-9
work_keys_str_mv AT salomondavidauthor dataprivacyandsecurityelectronicresource
AT springerlinkonlineservice dataprivacyandsecurityelectronicresource
_version_ 1756268046921498624