Data Privacy and Security

Author:   David Salomon
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2003
ISBN:  

9781441918161


Pages:   465
Publication Date:   14 December 2011
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $287.76 Quantity:  
Add to Cart

Share |

Data Privacy and Security


Add your own review!

Overview

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Full Product Details

Author:   David Salomon
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of the original 1st ed. 2003
Dimensions:   Width: 17.80cm , Height: 2.40cm , Length: 25.40cm
Weight:   0.905kg
ISBN:  

9781441918161


ISBN 10:   1441918167
Pages:   465
Publication Date:   14 December 2011
Audience:   Professional and scholarly ,  Professional and scholarly ,  College/higher education ,  Professional & Vocational ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Basic Concepts.- The Caesar Cipher.- The Affine Cipher.- The One-Time Pad.- Kerckhoffs’ Principle.- I. Data Encryption.- 1 Monoalphabetic Substitution Ciphers.- 2 Transposition Ciphers.- 3 Polyalphabetic Substitution Ciphers.- 4 Random Numbers.- 5 The Enigma.- 6 Stream Ciphers.- 7 Block Ciphers.- 8 Public-Key Cryptography.- 9 Quantum Cryptography.- II. Data Hiding.- 10 Data Hiding in Text.- 11 Data Hiding in Images.- 12 Data Hiding: Other Methods.- III. Essential Resources.- Appendixes.- A Convolution.- A.1 One-Dimensional Convolution.- A.2 Two-Dimensional Convolution.- B Hashing.- B.1 Hash Tables.- B.2 Hash Functions.- B.3 Collision Handling.- B.4 Secure Hash Functions.- C Cyclic Redundancy Codes.- D Galois Fields.- D.1 Field Definitions and Operations.- D.2 GF(256) and Rijndael.- D.3 Polynomial Arithmetic.- Answers to Exercises.- Cryptography Timeline.

Reviews

From the reviews: If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it. --IEEE Cipher This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library. (Cryptologia, Vol. 28 (4), 2004)


"From the reviews: ""If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it."" --IEEE Cipher ""This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. … there are numerous examples to reinforce the reader’s understanding and expertise with these techniques and methodologies. … an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library."" (Cryptologia, Vol. 28 (4), 2004)  "


From the reviews: If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days...It is one of the better presentations of cryptography because of the scholarship that went into producing it. --IEEE Cipher This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ! there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ! an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library. (Cryptologia, Vol. 28 (4), 2004)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List