Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

facebook
Google Book Preview
Public Key Cryptography: Applications and Attacks
— —
Lynn Margaret Batten
Public Key Cryptography: Applications and Attacks by Lynn Margaret Batten at Abbey's Bookshop,

Public Key Cryptography: Applications and Attacks

Lynn Margaret Batten


9781118317129

John Wiley & Sons Inc


Data encryption;
Network security


Hardback

224 pages

$139.95
We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional).

By:   Lynn Margaret Batten
Imprint:   John Wiley & Sons Inc
Country of Publication:   United States
Dimensions:   Height: 243mm,  Width: 158mm,  Spine: 18mm
Weight:   476g
ISBN:   9781118317129
ISBN 10:   1118317122
Series:   IEEE Press Series on Information and Communication Networks Security
Pages:   224
Publication Date:   January 2013
Audience:   Professional and scholarly ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active

Professor Lynn Batten holds the Deakin Chair in Mathematics and is the Director of the Information Security Research Group at Deakin University. Her research interests include combinatorial geometry, computer network security and computational chemistry. As Associate Dean for Academic and Industrial Research at the University of Manitoba, her former institution, she established a number of agreements between the University and various industry and government sectors.


The book is suitable as a university text for years three and above, and I recommend that every computer scientist read it. I would be inclined to describe this book as offering what every computer scientist should know about public key cryptography. ( Computing Reviews , 9 September 2013)

My Shopping Basket
Your cart does not contain any items.