Data Privacy and Security: Encryption and Information Hiding

Front Cover
Springer Science & Business Media, May 20, 2003 - Computers - 465 pages

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

 

What people are saying - Write a review

User Review - Flag as inappropriate

ammar

Contents

IX
21
X
22
XI
24
XII
28
XIII
29
XIV
30
XVI
35
XVII
39
LXXV
205
LXXVI
206
LXXVII
212
LXXVIII
214
LXXIX
218
LXXX
235
LXXXI
243
LXXXII
245

XVIII
40
XIX
44
XX
45
XXI
48
XXII
49
XXIII
53
XXIV
56
XXV
59
XXVI
60
XXVIII
62
XXIX
63
XXX
64
XXXI
66
XXXII
72
XXXIII
74
XXXIV
75
XXXV
76
XXXVI
77
XXXVII
80
XXXVIII
82
XXXIX
85
XLI
87
XLII
88
XLIII
91
XLIV
92
XLV
93
XLVI
97
XLVII
100
XLVIII
107
XLIX
111
L
113
LI
117
LII
131
LIII
133
LIV
134
LV
136
LVI
139
LVIII
145
LX
147
LXI
148
LXII
150
LXIII
155
LXIV
161
LXV
162
LXVI
175
LXVII
178
LXVIII
181
LXIX
183
LXX
195
LXXI
198
LXXII
199
LXXIII
203
LXXIV
204
LXXXIII
247
LXXXIV
250
LXXXV
251
LXXXVI
252
LXXXVII
255
LXXXIX
258
XC
262
XCI
269
XCII
280
XCIII
285
XCIV
294
XCV
297
XCVI
298
XCVII
299
XCVIII
301
XCIX
303
C
309
CI
312
CII
314
CIII
321
CIV
323
CV
325
CVII
328
CVIII
329
CIX
332
CX
336
CXI
339
CXII
341
CXIII
344
CXIV
347
CXV
351
CXVI
353
CXVII
356
CXVIII
361
CXIX
362
CXXI
367
CXXII
369
CXXIV
373
CXXV
377
CXXVII
378
CXXVIII
379
CXXIX
381
CXXX
383
CXXXI
387
CXXXIII
395
CXXXIV
399
CXXXV
401
CXXXVI
419
CXXXVII
429
CXXXVIII
441
CXXXIX
453
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page xiv - On the first of February we intend to begin submarine warfare unrestricted. In spite of this. it is our intention to endeavor to keep neutral the United States of America. If this attempt is not successful. we propose an alliance on the following basis with Mexico: That we shall make war together and together make peace. We shall give general financial support. and it is understood that Mexico is to reconquer the lost territory in New Mexico.
Page xiv - If this attempt is not successful, we propose an alliance on the following basis with Mexico: That we shall make war together and together make peace. We shall give general financial support, and it is understood that Mexico is to reconquer the lost territory in New Mexico, Texas and Arizona.

Bibliographic information