64,95 €
64,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
32 °P sammeln
64,95 €
64,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
32 °P sammeln
Als Download kaufen
64,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
32 °P sammeln
Jetzt verschenken
64,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
32 °P sammeln
  • Format: PDF

An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use 'both' information hiding techniques and encryption to protect digital data and have secure communications. All major topics and techniques are presented in an accessible style and suitable for specialists and nonspecialists.

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 48.19MB
Produktbeschreibung
An essential resource and monograph for all security researchers and practitioners who want to understand and effectively use 'both' information hiding techniques and encryption to protect digital data and have secure communications. All major topics and techniques are presented in an accessible style and suitable for specialists and nonspecialists.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
An essential resource and monograph for all security researchers and
practitioners who want to understand and effectively use 'both'
information hiding techniques and encryption to protect digital data
and have secure communications. All major topics and techniques are
presented in an accessible style and suitable for specialists and
nonspecialists.
Rezensionen
From the reviews:

"If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher

"This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. ... there are numerous examples to reinforce the reader's understanding and expertise with these techniques and methodologies. ... an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004)