|
|
|
|
LEADER |
02919cam a2200433 a 4500 |
001 |
29216 |
003 |
IGIG |
005 |
20100606233842.0 |
006 |
m eo d |
007 |
cr bn||||m|||a |
008 |
070608s2008 paua fob 001 0 eng d |
010 |
# |
# |
|z 2007024202
|
020 |
# |
# |
|a 9781599048390 (ebook)
|
020 |
# |
# |
|z 9781599048376 (hardcover)
|
020 |
# |
# |
|z 159904837X (hardcover)
|
020 |
# |
# |
|z 9781616927301 (pbk.)
|
024 |
7 |
# |
|a 10.4018/978-1-59904-837-6
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00540430
|
035 |
# |
# |
|a (OCoLC)550477907
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a QA76.9.A25
|b M663 2008e
|
082 |
0 |
4 |
|a 005.8
|2 22
|
100 |
1 |
# |
|a Mogollon, Manuel.
|
245 |
1 |
0 |
|a Cryptography and security services
|b mechanisms and applications /
|c Manuel Mogollon.
|h [electronic resource] :
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2008.
|
300 |
# |
# |
|a electronic texts (xv, 471 p. : ill.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references and index.
|
505 |
0 |
# |
|a 1. Classic cryptography -- 2. Information assurance -- 3. Number theory and finite fields -- 4. Confidentiality -- 5. Confidentiality -- 6. Integrity and authentication -- 7. Access authentication -- 8. Elliptic curve cryptograpy -- 9. Certificates and public key infrastructure -- 10. Electronic mail security -- 11. VPNS and IPSEC -- 12. TLS, SSL, and SET -- 13. Web services security -- 14. Wireless security.
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. This book addresses cryptography from the perspective of the security services and mechanisms available to implement these services: discussing issues such as e-mail security, public-key architecture, virtual private networks, Web services security, wireless security, and the confidentiality and integrity of security services. This book provides scholars and practitioners in the field of information assurance working knowledge of fundamental encryption algorithms and systems supported in information technology and secure communication networks.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Title from PDF t.p. (viewed on May 26, 2010).
|
650 |
# |
0 |
|a Computers
|x Access control.
|
650 |
# |
0 |
|a Data encryption (Computer science)
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC) 2007024202
|z 9781599048376
|z 159904837X
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59904-837-6
|z View fulltext via EzAccess
|