Data Privacy and Security by David Salomon: New

AlibrisBooks
(489239)
Registrato come venditore professionale
US $119,29
CircaEUR 103,40
Condizione:
Nuovo
Goditi i vantaggi. Restituzioni accettate.
Spedizione:
Gratis Standard Shipping.
Oggetto che si trova a: Sparks, Nevada, Stati Uniti
Consegna:
Consegna prevista tra il gio 6 nov e il gio 13 nov a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico dell'acquirente..
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:286554807072
Ultimo aggiornamento: 28 ott 2025 19:18:00 CETVedi tutte le revisioniVedi tutte le revisioni

Specifiche dell'oggetto

Condizione
Nuovo: Libro nuovo, intatto e non letto, in perfette condizioni, senza pagine mancanti o ...
Book Title
Data Privacy and Security
Publication Date
2003-05-20
Pages
465
ISBN
9780387003115
Categoria

Informazioni su questo prodotto

Product Identifiers

Publisher
Springer New York
ISBN-10
0387003118
ISBN-13
9780387003115
eBay Product ID (ePID)
2440959

Product Key Features

Number of Pages
Xiv, 465 Pages
Language
English
Publication Name
Data Privacy : Encryption and Information Hiding
Publication Year
2003
Subject
Information Theory, Security / Cryptography, Security / General, Databases / General
Type
Textbook
Author
David Salomon
Subject Area
Computers
Series
Springer Professional Computing Ser.
Format
Hardcover

Dimensions

Item Weight
36.3 Oz
Item Length
9.3 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2002-044524
Dewey Edition
21
Reviews
From the reviews: "If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher "This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004), From the reviews: "If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher "This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004)  
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Basic Concepts.- The Caesar Cipher.- The Affine Cipher.- The One-Time Pad.- Kerckhoffs' Principle.- I. Data Encryption.- 1 Monoalphabetic Substitution Ciphers.- 2 Transposition Ciphers.- 3 Polyalphabetic Substitution Ciphers.- 4 Random Numbers.- 5 The Enigma.- 6 Stream Ciphers.- 7 Block Ciphers.- 8 Public-Key Cryptography.- 9 Quantum Cryptography.- II. Data Hiding.- 10 Data Hiding in Text.- 11 Data Hiding in Images.- 12 Data Hiding: Other Methods.- III. Essential Resources.- Appendixes.- A Convolution.- A.1 One-Dimensional Convolution.- A.2 Two-Dimensional Convolution.- B Hashing.- B.1 Hash Tables.- B.2 Hash Functions.- B.3 Collision Handling.- B.4 Secure Hash Functions.- C Cyclic Redundancy Codes.- D Galois Fields.- D.1 Field Definitions and Operations.- D.2 GF(256) and Rijndael.- D.3 Polynomial Arithmetic.- Answers to Exercises.- Cryptography Timeline.
Synopsis
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security., An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use 'both' information hiding techniques and encryption to protect digital data and have secure communications. All major topics and techniques are presented in an accessible style and suitable for specialists and nonspecialists.
LC Classification Number
QA268

Descrizione dell'oggetto fatta dal venditore

Informazioni sul venditore professionale

Certifico che tutte le mie attività di vendita saranno conformi alle leggi e ai regolamenti dell'Unione europea.

Informazioni su questo venditore

AlibrisBooks

99% di Feedback positivi2,0 milioni oggetti venduti

Su eBay da mag 2008
In genere risponde entro 24 ore
Registrato come venditore professionale
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
Mostra altro

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.9
Spese spedizione
5.0
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (543.598)

Tutti i punteggiselected
Positivo
Neutro
Negativo
  • e***u (283)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    The listing was for a hardcover version of this book; however, I received a paperback. The Seller replied quickly to my question about this issue and issued a full refund - and let me keep the book. So, a diligent Seller for sure - and well packaged and reasonable timing on shipping. Thank you for the refund, and as you suggested, I'll likely donate this volume and seek the hardcover.
  • e***n (392)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Great transaction, exactly as described, packed well, and promptly shipped on August 6th. Unfortunately the U.S. Postal Service took 23 calendar days to deliver the book. It was shipped from Pennsylvania, to Atlanta, past Alabama to Texas, enjoyed several days in Texas, then to Minneapolis, Jacksonville, Florida, back to Atlanta, finally to Birmingham, and Huntsville. The seller was very responsive and I decided it was interesting to see if/how the book would arrive. Thanks, Joe
  • 0***g (380)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Excellent purchase. Was able to get all three items from the one seller. Seller was able to bundle all three items together into one package. Items as described and arrived in perfect condition. Good communication around shipping and tracking as items delayed and not able to be delivered by original estimate. Thanks to shipping updates I was able to track the items arriving before the extended delivery time. Thank you for making these items available on EBay.