Logo

Cryptography and Data Security

Large book cover: Cryptography and Data Security

Cryptography and Data Security
by

Publisher: Addison-Wesley
ISBN/ASIN: 0201101505
ISBN-13: 9780201101508
Number of pages: 419

Description:
The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles.

Home page url

Download or read it online for free here:
Download link
(19MB, PDF)

Similar books

Book cover: Rethinking Public Key Infrastructures and Digital CertificatesRethinking Public Key Infrastructures and Digital Certificates
by - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
(6439 views)
Book cover: Good Digital Hygiene: A guide to staying secure in cyberspaceGood Digital Hygiene: A guide to staying secure in cyberspace
by - Bookboon
The explosive growth in the adoption of electronic devices by the general population is creating and environment where some measures of digital hygiene are needed to protect the devices and the data they contain as well as their owners.
(4406 views)
Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(216 views)
Book cover: The Protection of Information in Computer SystemsThe Protection of Information in Computer Systems
by - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
(5188 views)