Descript. |
xiv, 465 pages : illustrations ; 25 cm. |
Bibliog. |
Includes bibliographical references and index. |
Contents |
Pt. I. Data Encryption -- 1. Monoalphabetic Substitution Ciphers -- 2. Transposition Ciphers -- 3. Polyalphabetic Substitution Ciphers -- 4. Random Numbers -- 5. The Enigma -- 6. Stream Ciphers -- 7. Block Ciphers -- 8. Public-Key Cryptography -- 9. Quantum Cryptography -- Pt. II. Data Hiding -- 10. Data Hiding in Text -- 11. Data Hiding in Images -- 12. Data Hiding: Other Methods -- Pt. III. Essential Resources -- App. A. Convolution -- App. B. Hashing -- App. C. Cyclic Redundancy Codes -- App. D. Galois Fields. |
Subject |
Computer security.
|
|
Data encryption (Computer science)
|
|
Data protection.
|
ISBN |
9781441918161 (pbk.) |
|
0387003118 (alk. paper) |
|