Data Privacy and Security by David Salomon: New

AlibrisBooks
(488527)
Registrado como vendedor profesional
USD119,29
Aproximadamente103,15 EUR
Estado:
Nuevo
Respira tranquilidad. Se aceptan devoluciones.
Envío:
Gratis Standard Shipping.
Ubicado en: Sparks, Nevada, Estados Unidos
Entrega:
Entrega prevista entre el mar. 4 nov. y el sáb. 8 nov. a 94104
Calculamos el plazo de entrega con un método patentado que combina diversos factores, como la proximidad del comprador a la ubicación del artículo, el servicio de envío seleccionado, el historial de envíos del vendedor y otros datos. Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:286554807072
Última actualización el 28 oct 2025 19:18:00 H.EspVer todas las actualizacionesVer todas las actualizaciones

Características del artículo

Estado
Nuevo: Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin ...
Book Title
Data Privacy and Security
Publication Date
2003-05-20
Pages
465
ISBN
9780387003115
Categoría

Acerca de este producto

Product Identifiers

Publisher
Springer New York
ISBN-10
0387003118
ISBN-13
9780387003115
eBay Product ID (ePID)
2440959

Product Key Features

Number of Pages
Xiv, 465 Pages
Language
English
Publication Name
Data Privacy : Encryption and Information Hiding
Publication Year
2003
Subject
Information Theory, Security / Cryptography, Security / General, Databases / General
Type
Textbook
Author
David Salomon
Subject Area
Computers
Series
Springer Professional Computing Ser.
Format
Hardcover

Dimensions

Item Weight
36.3 Oz
Item Length
9.3 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2002-044524
Dewey Edition
21
Reviews
From the reviews: "If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher "This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004), From the reviews: "If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher "This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004)  
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Basic Concepts.- The Caesar Cipher.- The Affine Cipher.- The One-Time Pad.- Kerckhoffs' Principle.- I. Data Encryption.- 1 Monoalphabetic Substitution Ciphers.- 2 Transposition Ciphers.- 3 Polyalphabetic Substitution Ciphers.- 4 Random Numbers.- 5 The Enigma.- 6 Stream Ciphers.- 7 Block Ciphers.- 8 Public-Key Cryptography.- 9 Quantum Cryptography.- II. Data Hiding.- 10 Data Hiding in Text.- 11 Data Hiding in Images.- 12 Data Hiding: Other Methods.- III. Essential Resources.- Appendixes.- A Convolution.- A.1 One-Dimensional Convolution.- A.2 Two-Dimensional Convolution.- B Hashing.- B.1 Hash Tables.- B.2 Hash Functions.- B.3 Collision Handling.- B.4 Secure Hash Functions.- C Cyclic Redundancy Codes.- D Galois Fields.- D.1 Field Definitions and Operations.- D.2 GF(256) and Rijndael.- D.3 Polynomial Arithmetic.- Answers to Exercises.- Cryptography Timeline.
Synopsis
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies. Features & Benefits: * Incorporates both data encryption and data hiding * Supplies a wealth of exercises and solutions to help readers readily understand the material * Presents information in an accessible, nonmathematical style * Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals * Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography. The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security., An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use 'both' information hiding techniques and encryption to protect digital data and have secure communications. All major topics and techniques are presented in an accessible style and suitable for specialists and nonspecialists.
LC Classification Number
QA268

Descripción del artículo del vendedor

Información de vendedor profesional

Certifico que todas mis actividades de venta cumplirán todas las leyes y reglamentos de la UE.

Acerca de este vendedor

AlibrisBooks

99% de votos positivos2,0 millones artículos vendidos

Se unió el may 2008
Suele responder en 24 horas
Registrado como vendedor profesional
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
Ver más
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
4.9
Gastos de envío razonables
5.0
Rapidez de envío
5.0
Comunicación
5.0

Votos de vendedor (542.829)

Todas las valoracionesselected
Positivas
Neutras
Negativas
  • e***u (283)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    The listing was for a hardcover version of this book; however, I received a paperback. The Seller replied quickly to my question about this issue and issued a full refund - and let me keep the book. So, a diligent Seller for sure - and well packaged and reasonable timing on shipping. Thank you for the refund, and as you suggested, I'll likely donate this volume and seek the hardcover.
  • e***n (392)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Great transaction, exactly as described, packed well, and promptly shipped on August 6th. Unfortunately the U.S. Postal Service took 23 calendar days to deliver the book. It was shipped from Pennsylvania, to Atlanta, past Alabama to Texas, enjoyed several days in Texas, then to Minneapolis, Jacksonville, Florida, back to Atlanta, finally to Birmingham, and Huntsville. The seller was very responsive and I decided it was interesting to see if/how the book would arrive. Thanks, Joe
  • 0***g (380)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Excellent purchase. Was able to get all three items from the one seller. Seller was able to bundle all three items together into one package. Items as described and arrived in perfect condition. Good communication around shipping and tracking as items delayed and not able to be delivered by original estimate. Thanks to shipping updates I was able to track the items arriving before the extended delivery time. Thank you for making these items available on EBay.