Introduction To Cryptography and Network Security

In this new first edition, well-known author, Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of n...

Full description

Saved in:
Bibliographic Details
Main Author: Forouzan, Behrouz A. (Author)
Format: Book
Language:English
Published: Boston McGraw-Hill Higher Education 2008
© 2008
Series:McGraw-Hill Forouzan networking series
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-358214
005 20209115186
008 201001 2008 -US a|| |00 #eng#D
020 # # |a 9780072870220  |q hardback 
020 # # |a 0072870222  |q hardback 
020 # # |a 9780073327532 (set)  |q hardback 
020 # # |a 0073327530 (set)  |q hardback 
040 # # |a DLC  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5105.59  |b .F672 2008 
100 1 # |a Forouzan, Behrouz A.  |e author 
245 1 0 |a Introduction To Cryptography and Network Security  |c Behrouz A. Forouzan 
264 # 1 |a Boston  |b McGraw-Hill Higher Education  |c 2008 
264 # 1 |c © 2008 
300 # # |a xxvi, 721 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a McGraw-Hill Forouzan networking series 
504 # # |a Includes bibliographical references (p 707-708) and index 
520 # # |a In this new first edition, well-known author, Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning. 
650 # 0 |a Cryptography 
650 # 0 |a Computer networks  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=358214 
964 # # |c BOK  |d 01 
998 # # |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2||