Language : English
Published : 2014-11-01
Pages : 372
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today’s designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
Out of stock
his book is a quantitative text, which focuses on the real issues behind serious modeling and analysis of communications networks. The author covers all the necessary mathematics and theory in order for students to understand the tools that optimize computer networks today.
- Covers both classical (e.g. queueing theory) and modern (e.g. pricing) aspects of networking
- Integrates material on communication networks with material on modeling/analyzing and designing such networks
- Includes a Solution Manual
This book covers the field of machine learning, which is the study of algorithms that allow computer programs to automatically improve through experience. The book is intended to support upper level undergraduate and introductory level graduate courses in machine learning.
About the Author
Nicole Fenton is an independent writer and editor in Brooklyn. She has worked at a large social network, a startup incubator, a design studio, and Apple. She manages content projects of all sizes and teaches writing as a design practice. Kate Kiefer Lee is a writer and editor at MailChimp and a former magazine editor. She has written for publications like Forbes and A List Apart, and spoken about web content around the world. She teaches people how to write like they talk.
Computing Essentials 2015 allows you to Make IT Work for You through relevant explorations, ethics and environment themes throughout each chapter. Current examples, references and exercises allow students to be successful in understanding today’s role of Computer Information Technology. This definitive approach provides the essentials students need while bringing them a full digital solution through Connect CIT. Connect CIT is an online learning and assessment platform that engages today’s students and helps them apply the key concepts they are learning.
O’Leary; Computing Essentials 2015: Make IT Work for You! Additional textbook resources can be found on the text’s Online Learning Center: www.mhhe.com/computing2015.