Book
Licensed
Unlicensed
Requires Authentication
Computer Security and Encryption
An Introduction
-
S. R. Chauhan
Language:
English
Published/Copyright:
2020
About this book
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers.
Features:
- Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems
- Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)
Author / Editor information
Chauhan S. R. :
S. R. Chauhan is a university instructor with over 20 years of experience teaching courses in cybersecurity and cybercrime.
Jangra S. :
S. Jangra, PhD is a university instructor with over 20 years of experience teaching courses in cybersecurity and cybercrime.
Topics
Publicly Available Download PDF |
i |
Publicly Available Download PDF |
v |
Publicly Available Download PDF |
xix |
Requires Authentication Unlicensed Licensed Download PDF |
1 |
Requires Authentication Unlicensed Licensed Download PDF |
27 |
Requires Authentication Unlicensed Licensed Download PDF |
65 |
Requires Authentication Unlicensed Licensed Download PDF |
107 |
Requires Authentication Unlicensed Licensed Download PDF |
143 |
Requires Authentication Unlicensed Licensed Download PDF |
181 |
Requires Authentication Unlicensed Licensed Download PDF |
221 |
Requires Authentication Unlicensed Licensed Download PDF |
267 |
Requires Authentication Unlicensed Licensed Download PDF |
311 |
Requires Authentication Unlicensed Licensed Download PDF |
345 |
Publishing information
Pages and Images/Illustrations in book
eBook published on:
July 10, 2020
eBook ISBN:
9781683925293
Paperback published on:
July 23, 2020
Paperback ISBN:
9781683925316
Pages and Images/Illustrations in book
Main content:
350
Keywords for this book
public key crypto; ipsec; firewall; cybercrime; cryptography; system security; object model communications; inter-object communications; big data analytics; cloud; IoT; internet of things; Smart Grid; SCADA; control systems; WSN; security models; network design; VPN
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com