null
Loading... Please wait...
FREE SHIPPING on All Unbranded Items LEARN MORE
Print This Page

Protocols and Procedures of Cryptography and Network Security

List Price: $94.95
SKU:
9781632404237
Quantity:
Minimum Purchase
25 unit(s)
  • Availability: Confirm prior to ordering
  • Branding: minimum 50 pieces (add’l costs below)
  • Check Freight Rates (branded products only)

Branding Options (v), Availability & Lead Times

  • 1-Color Imprint: $2.00 ea.
  • Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
  • Belly-Band Wrap: $2.50 ea. (full-color printed)
  • Set-Up Charge: $45 per decoration
FULL DETAILS
  • Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
  • Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
  • Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
  • RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
  • Product Details

    Author:
    Stephen Mason
    Format:
    Hardcover
    Pages:
    156
    Publisher:
    CLANRYE INTERNATIONAL (March 28, 2015)
    Language:
    English
    ISBN-13:
    9781632404237
    ISBN-10:
    1632404230
    Dimensions:
    5.98" x 9.02"
    File:
    TWO RIVERS-PERSEUS-Metadata_Only_Perseus_Distribution_Customer_Group_Metadata_20250917125235-20250918.xml
    Folder:
    TWO RIVERS
    List Price:
    $94.95
    Case Pack:
    38
    As low as:
    $82.61
    Publisher Identifier:
    P-PER
    Discount Code:
    F
    Pub Discount:
    45
    Weight:
    13.44oz
    Imprint:
    CLANRYE INTERNATIONAL
  • Overview

    This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic data storage and communications, efficient security of information has become a crucial need. The most efficient tool for the protection of information is cryptography, used in a combination with other tools for assuring the security of information in all of its applications, including user authentication, data integrity and confidentiality. This book is a compilation of in-depth research work in the field of cryptography. It describes some of the crucial challenges faced by the present computing world as well as a few techniques to defend against these challenges. It aims at serving as a useful source of reference for engineers, graduate and doctoral students, researchers, faculty members of universities, etc.