21st century the college IT security professional planning materials: computer security and privacy(Chinese Edition)
Ein Angebot gefunden

Bester Preis: 56,02 (vom 12.12.2019)
Aus dem Archiv:
1
LI HUI

21st century the college IT security professional planning materials: computer security and privacy(Chinese Edition) (2013)

Lieferung erfolgt aus/von: China, Volksrepublik ~EN PB NW SI

ISBN: 9787302293873 bzw. 7302293872, vermutlich in Englisch, Taschenbuch, neu, signiert.

56,02 ($ 62,04)¹ + Versand: 9,03 ($ 10,00)¹ = 65,05 ($ 72,04)¹
unverbindlich
Lieferung aus: China, Volksrepublik, Versandkosten nach: DEU.
Von Händler/Antiquariat, BookerStudy.
paperback. New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: 2013 Pages: 268 Language: Chinese in Publisher: Tsinghua University Press Information security is an emerging hot spot for the computer. communications and related professional. 21st century the colleges information security professional planning textbook: Computer Security and confidentiality of 10 years of teaching experience. combined with the characteristics of a computer professional. brings together many of the students on topics of interest. trying to easy to understand. step-by-step. and attention to the combination of examples and applications. attach importance to point and face. In order to facilitate the arrangement of teaching. the 21st century the colleges information security professional planning textbook: computer security and confidentiality is divided into a total of 10 chapters. Chapter 1 describes some common of classical cryptography system algorithm; Chapter 2 describes the the symmetric cryptosystem rarely mentioned and domestic materials. including DES. AES encryption and decryption mode; Chapters 3-5 introduce public key cryptography system. Chapter 3 of public key cryptography system based on large numbers factorization problem. Chapter 4 public key cryptography system based on the discrete logarithm problem. Chapter 5. some public-key cryptosystem based on other completely NP problem; first six chapters introduce digital signature principle; Chapter 7 describes the Hash function based on Hash functions and symmetric ciphers message authentication code; Chapter 8 describes the key management and PKI technology; Chapter 9 to present computer security in the form of the topic mainstream technology applications. including password security. VPN. etc.; Chapter 10. based on the Java platform introduces cryptography and security programming framework and technology. Chapter. Chapters 1-7 emphasis on theory and principles; Chapter 8 and Chapter 9. emphasis on the application; Chapter 10 emphasis on programming. 21st century the colleges information security professional planning textbook: Computer Security and confidentiality covering more knowledge can be used as the College of Computer Science textbook. the book provides a large number of data instances. can also serve as teachers. researchers. and interest reference book lovers. The basic concepts of Contents: Introduction Chapter 1 classical cryptography system 1.1 cryptosystem 1.2 Shift Cipher System 1.3 Euclidean expansion algorithm the 1.4 single table substitution cryptanalysis 1.6 Hill 1.5 Vigenere password system password system 1.7 stream cipher system 1.8 Exercises Chapter 2 symmetric cryptography 2.1 LFSR-based stream cipher encryption mode 2.2 DES2.3 AES2.4 2.5 Exercises Chapter 3. based on the factorization public key cryptography system 3.1 Euler function and cyclic group 3.2 RSA 3.3 RSA implementation principle 3.4 large 3.6 Exercises Chapter 4. number factorization 3.5 Rabin public key cryptography based on public key cryptography system discrete logarithm problem 4.1 EIGamal public key cryptography system 4.2 Elliptic Curve Cryptosystem 4.3 elliptic curve scalar multiplication 4.3.1 binary method 4.3.2 signed binary method 4.3.3 Comb scalar multiplication algorithm 4.4 elliptic curve order basis points 4.5 GF (2m) elliptic curve domain 4.6 discrete logarithm problem solving knapsack public key system 4.7 Exercises Chapter 5 public key cryptography system 5.1 5.2 5.3 NTRU public-key cryptosystem of McEliece public key cryptography system 5.4 probability of public key cryptography system 5.5 Exercises Chapter 6 Digital Signature 6.1 digital signature scheme 6.1.1 digital signature scheme definition 6.1.2 RSA Signature Scheme 6.2 EIGamal signature scheme with DSA6.3- in ECDSA6.4 time signature scheme 6.5 6.6 Fail-stop signature scheme with non-repudiation signature program 7.3 6.7 Other special signature scheme Profile 6.8 Exercises Chapter 7 Hash functions and message authentication code 7.1 Hash functions basic concepts 7.2 Hash functions structure with iterative structure The Hash algorithm 7.4 Message Authentication Code 7.5 Exercises Chapter 8 Chapter 9 of the computer security topics of key management and public key infrastructure Chapter 10 of cryptography and security programming Appendix A Shannon theory Appendix B AES instance References Satisfaction guaranteed,or money back.
Daten vom 12.12.2019 10:55h
ISBN (andere Schreibweisen): 7-302-29387-2, 978-7-302-29387-3
Zuerst gefunden: 12.12.2019 10:55:50
Zuletzt gefunden: 12.12.2019 10:55:50
Kleinster Preis: 56,02 (vom 12.12.2019 10:55:50)
Höchster Preis: 56,02 (vom 12.12.2019 10:55:50)
Fundstellen insgesamt: 1

Momentan keine Suchergebnisse - vielleicht bald lieferbar

Ihre Suche nach ist bei mehr als 100 angebundenen Webshops momentan nicht lieferbar. Wir finden dieses Buch aber trotzdem innerhalb weniger Wochen.

Sie Suchen nach diesem Buch:
LI HUI: 21st century the college IT security professional planning materials: computer security and privacy(Chinese Edition)
ISBN: 9787302293873

Speichern Sie diese Suche kostenlos in ab, dann werden Sie automatisch benachrichtigt, sobald dieses Buch verfügbar ist. Meistens finden wir dieses Buch innerhalb weniger Wochen und verständigen Sie dann per E-Mail. Sie können dann frei entscheiden, ob Sie das Buch kaufen wollen oder nicht.

Unsere Suchtipps für Ihre Suche:

Sie haben jetzt folgende Möglichkeiten:

  • Speichern Sie diese Seite in Ihren Lesezeichen oder Favoriten ab, dann können Sie jederzeit die Suche erneut ausführen.
  • Das Buch ist tatsächlich derzeit vergriffen bzw. nicht lieferbar. Es ist z.B. eine Rarität. Möglicherweise ist es aber in einiger Zeit lieferbar. Speichern Sie dazu diese Suche kostenlos ab oder lassen Sie sich kostenlos auf dieses Gerät benachrichten und Sie werden automatisch per E-Mail oder Nachricht informiert, sobald dieses Buch wieder lieferbar wird. Wir sind zuversichtlich, dass wir jedes Buch auf diese Weise innerhalb relativ kurzer Zeit finden. Probieren Sie es einfach aus!

Anmeldung mit Google:

ODER

Anmeldung mit Facebook:

Mit Facebook anmelden oder registrieren

Lade…