The chapters of the student text directly match the award units, and contain all the content for the full award.
The chapters of the student text directly match the award units, and contain all the content for the full award.
This well-organized text presents the principles, techniques, design, and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed. Key Features Covers the latest topic of computer forensics and the areas in which they can be applied. Gives algorithms with numerical explanations. Provides a large number of solved problems. The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).
This well-organized text presents the principles, techniques, design, and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects.
The development of new technologies and information systems means that all managers need to be aware of the potential these hold for their business. John Ward leads the readers through the processes for identifying information needs and uses, etc.
John Ward leads the readers through the processes for identifying information needs and uses, etc.
MIS courses are offered in schools of business either at the undergraduate level in the junior/senior year, or at the MBA level.
MIS courses are offered in schools of business either at the undergraduate level in the junior/senior year, or at the MBA level.
Evaluates essential sources in information technology, including books, journals, microforms, online databases, CD-ROMs, & viewdata.
Evaluates essential sources in information technology, including books, journals, microforms, online databases, CD-ROMs, & viewdata.
"This book addresses challenges in managing information resources in dynamic social environments across cultures, including research on key factors for social acceptance of information technology, and user adoption of information management methods. It explores new paradigms under which information resources will generate original meanings for a contemporary generation of users, with emphasis on user-centered and culture-centric information systems"--Provided by publisher.
"This book addresses challenges in managing information resources in dynamic social environments across cultures, including research on key factors for social acceptance of information technology, and user adoption of information management ...