Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Choose an application
Choose an application
Computer architecture. Operating systems --- Computer security --- Computers --- Electronic data processing departments --- Computer networks --- Access control --- Security measures --- Computer security. --- Security measures. --- Access control. --- Computers - Access control --- Electronic data processing departments - Security measures --- Computer networks - Security measures --- Réseaux d'ordinateurs --- Mesures de sûreté.
Choose an application
Computer architecture. Operating systems --- Computer security --- Computers --- Electronic data processing departments --- Sécurité informatique --- Informatique, Centres d' --- Access control --- Security measures --- Sûreté --- Mesures --- -Electronic data processing departments --- -#TELE:COSIC --- Computer centers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer privacy --- Computer system security --- Electronic digital computers --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer security. --- Access control. --- Security measures. --- Sécurité informatique --- Sûreté --- Cyber security --- Cybersecurity --- Protection of computer systems --- Protection --- #TELE:COSIC --- Computer department security measures --- Computers - Access control --- Electronic data processing departments - Security measures
Choose an application
"With ever more of our commercial and personal lives occurring electronically, network security is vital. When networks don't have secure foundations, malware steals from us, invades our privacy, and threatens our safety. This guide uncovers the technology behind network security: its strengths, weaknesses, past, and future. It answers fundamental questions like: How do you identify yourself and prevent others from impersonating you? How do you communicate with others? How do you maintain your privacy? How do you buy and sell things? As a tutorial, it explains sophisticated concepts in a friendly and intuitive manner. As a reference, it covers concepts and techniques rigorously and in depth. The authors cover a wide spectrum of topics essential for securing web-based transactions, including public and secret key cryptography, hashes/message digests, signatures, authentication, blockchains, electronic money, secret sharing, and multiparty computation. They also address exciting emerging issues such as quantum computing, post-quantum algorithms, homomorphic encryption, and secure multiparty computation. Wherever math beyond high school algebra is needed, Network Security, 3rd Edition covers what students and other readers need to know, making it a self-contained solution suitable for undergraduate students, graduate students, and working engineers alike. To support learning and mastery, it also includes extensive homework problems, fully updated to reflect current concepts and technologies" [Publisher]
Computer networks --- Réseaux d'ordinateurs --- Security measures. --- Mesures de sûreté.
Listing 1 - 5 of 5 |
Sort by
|