Logo

Cryptography and Data Security

Large book cover: Cryptography and Data Security

Cryptography and Data Security
by

Publisher: Addison-Wesley
ISBN/ASIN: 0201101505
ISBN-13: 9780201101508
Number of pages: 419

Description:
The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks. The book is for students and professionals seeking an introduction to these principles.

Home page url

Download or read it online for free here:
Download link
(19MB, PDF)

Similar books

Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(7274 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(5766 views)
Book cover: Information Security in EducationInformation Security in Education
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(10964 views)
Book cover: Handbook of Information Security ManagementHandbook of Information Security Management
by - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(14044 views)