Practical cryptography / [Book] Jamie White.
Material type: TextDescription: viii, 235 pages ; 26 cmISBN:- 9781639874446 (hardback)
- Computer Science
- Cryptography
- Computer security
- Electrical and Computer Engineering-- -- Electrical Engineering--
- Electrical Engineering--
- Power quality -- Industrial sectors -- Power generation systems -- MATLAB
- Electric power quality -- Climate change -- Dynamic voltage restorer
- Biosciences-- -- Biochemistry and Molecular Biology--
- Biochemistry and Molecular Biology--
- Expression analysis -- Breast
- miR-3648 -- Therapeutic interventions
- Biosciences-- -- Microbiology and Immunology--
- Microbiology and Immunology--
- Inflammatory biomarkers -- Type 2 diabetes -- Serum ferritin
- COVID-19 patients -- SARS-CoV-2 -- Hyperinflammatory condition
- Mathematics--
- Mathematics--
- Non-newtonian casson -- Porosity reduces heat
- Non-darcy porous -- Heat transfer
- Electrical and Computer Engineering-- -- Electrical Engineering --
- Electrical Engineering --
- Radio spectrum utilization -- Cognitive radio network
- Internet -- CNR
- 005.8
- 005.8
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Junaid Zaidi Library, COMSATS University Islamabad Ground Floor | 005.8 WHI-P 61492 (Browse shelf(Opens below)) | Available | 10001000061492 |
Browsing Junaid Zaidi Library, COMSATS University Islamabad shelves, Shelving location: Ground Floor Close shelf browser (Hides shelf browser)
005.8 WHI-P Principles of information security | 005.8 WHI-P Principles of information security | 005.8 WHI-P Principles of information security | 005.8 WHI-P 61492 Practical cryptography / | 005.8 WHI-R Roadmap to information security : for IT and InfoSec managers / | 005.8 WON-S Security metrics a beginner's guide / | 005.8 WRI-I Information security contemporary cases / |
The discipline of cryptography studies the techniques and practices which can be used for secure communication in the presence of hostile parties. Its primary objective is to construct and analyze protocols which can be used to stop unauthorized parties from reading private messages. Cryptography is a multidisciplinary field which draws on the principles of computer science, mathematics, electrical engineering, physics and communication science. The guiding principles of this subject are data integrity, data confidentiality, non-repudiation and authentication. Modern cryptography can be categorized into various sub fields such as symmetric key cryptography, public key cryptography, cryptanalysis and cryptosystems. It finds application across various domains such as electronic commerce, digital currencies, computer passwords, military communications and payment systems. This book presents the complex subject of cryptography in the most comprehensible and easy to understand language. The topics included herein on cryptography are of utmost significance and bound to provide incredible insights to readers. This book is an essential guide for both academicians and those who wish to pursue this discipline further.
All
All
All
All
All
All
There are no comments on this title.