CRYPTOGRAPHY AND SECURITY
Material type:
- 978-81-265-2285-9
- 005.8/SHY/HAR
Item type | Current library | Call number | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|
![]() |
Symbiosis Institute of Computer Studies and Research IT | 005.8/SHY/HAR (Browse shelf(Opens below)) | Available | COMPUTER SECURITY,CRYPTOGRAPHY,E-MAIL SECURITY,SYSTEM SECURITY | SICSR-B-18485 |
Browsing Symbiosis Institute of Computer Studies and Research shelves, Shelving location: IT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
004/RAJ FUNDAMENTALS OF COMPUTERS | 005.30287/WHI/ARB HOW GOOGLE TESTS SOFTWARE | 005.3/WOL ANDROID DEVELOPER TOOLS ESSENTIALS | 005.8/SHY/HAR CRYPTOGRAPHY AND SECURITY | 005.8/SIX APPLICATION SECURITY FOR THE ANDROID PLATFORM:PROCESSES,PERMISSIONS, AND OTHER SAFEGUARDS | 005.13/CUL/RAD Commercial and Industrial Internet of Things Applications with the Raspberry Pi: Prototyping IoT Solutions | 006.78/DOS/NAN CLOUD COMPUTING:A PRACTITOINER'S GUIDE |
In this book, basic concepts of cryptography and security are introduced. Cryptography and security are dealt with in sufficient depth and detail without losing focus. Symmetric and asymmetric key cryptography Elliptic curve cryptography, hashing functions, message authentication, and digital signature are discussed and salient features in each explained.
NW/RACK
There are no comments on this title.