Cryptography and network security: principles and practice

By: Material type: TextTextPublication details: Upper Saddle River, NJ ; Perason Prentice Hall; 2011Edition: 5th edDescription: 746 p; Includes referencesISBN:
  • 978-0-13-705632-3
Subject(s): DDC classification:
  • C 005.8 St9c
Summary: In this age of universal electronic connectivity, of viruses and hackers, of electronic eaves-dropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communi-cated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eaves-dropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communi-cated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.

There are no comments on this title.

to post a comment.
Share