Introduction To Cryptography and Network Security
In this new first edition, well-known author, Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of n...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston
McGraw-Hill Higher Education
2008
© 2008 |
Series: | McGraw-Hill Forouzan networking series
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-358214 | ||
005 | 20209115186 | ||
008 | 201001 2008 -US a|| |00 #eng#D | ||
020 | # | # | |a 9780072870220 |q hardback |
020 | # | # | |a 0072870222 |q hardback |
020 | # | # | |a 9780073327532 (set) |q hardback |
020 | # | # | |a 0073327530 (set) |q hardback |
040 | # | # | |a DLC |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5105.59 |b .F672 2008 |
100 | 1 | # | |a Forouzan, Behrouz A. |e author |
245 | 1 | 0 | |a Introduction To Cryptography and Network Security |c Behrouz A. Forouzan |
264 | # | 1 | |a Boston |b McGraw-Hill Higher Education |c 2008 |
264 | # | 1 | |c © 2008 |
300 | # | # | |a xxvi, 721 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
490 | 1 | # | |a McGraw-Hill Forouzan networking series |
504 | # | # | |a Includes bibliographical references (p 707-708) and index |
520 | # | # | |a In this new first edition, well-known author, Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning. |
650 | # | 0 | |a Cryptography |
650 | # | 0 | |a Computer networks |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=358214 |
964 | # | # | |c BOK |d 01 |
998 | # | # | |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2|| |