Online Library TheLib.net » Data Privacy and Security
cover of the book Data Privacy and Security

Ebook: Data Privacy and Security

00
27.01.2024
0
0

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.




Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.




Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.


Content:
Front Matter....Pages i-xiv
Introduction....Pages 1-17
Front Matter....Pages 19-19
Monoalphabetic Substitution Ciphers....Pages 21-37
Transposition Ciphers....Pages 39-57
Polyalphabetic Substitution Ciphers....Pages 59-92
Random Numbers....Pages 92-105
The Enigma....Pages 107-129
Stream Ciphers....Pages 131-153
Block Ciphers....Pages 155-194
Public-Key Cryptography....Pages 195-234
Quantum Cryptography....Pages 235-241
Front Matter....Pages 243-243
Data Hiding in Text....Pages 245-267
Data Hiding in Images....Pages 269-337
Data Hiding: Other Methods....Pages 339-365
Back Matter....Pages 367-465


Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.


Content:
Front Matter....Pages i-xiv
Introduction....Pages 1-17
Front Matter....Pages 19-19
Monoalphabetic Substitution Ciphers....Pages 21-37
Transposition Ciphers....Pages 39-57
Polyalphabetic Substitution Ciphers....Pages 59-92
Random Numbers....Pages 92-105
The Enigma....Pages 107-129
Stream Ciphers....Pages 131-153
Block Ciphers....Pages 155-194
Public-Key Cryptography....Pages 195-234
Quantum Cryptography....Pages 235-241
Front Matter....Pages 243-243
Data Hiding in Text....Pages 245-267
Data Hiding in Images....Pages 269-337
Data Hiding: Other Methods....Pages 339-365
Back Matter....Pages 367-465
....
Download the book Data Privacy and Security for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen