Protocols and Procedures of Cryptography and Network Security
List Price:
$94.95
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Stephen Mason
Format:
Hardcover
Pages:
156
Publisher:
CLANRYE INTERNATIONAL (March 28, 2015)
Language:
English
ISBN-13:
9781632404237
ISBN-10:
1632404230
Dimensions:
5.98" x 9.02"
File:
TWO RIVERS-PERSEUS-Metadata_Only_Perseus_Distribution_Customer_Group_Metadata_20250917125235-20250918.xml
Folder:
TWO RIVERS
List Price:
$94.95
Case Pack:
38
As low as:
$82.61
Publisher Identifier:
P-PER
Discount Code:
F
Pub Discount:
45
Weight:
13.44oz
Imprint:
CLANRYE INTERNATIONAL
Overview
This book provides an overview on various methodologies and procedures of cryptography. In the times of escalating worldwide development of electronic data storage and communications, efficient security of information has become a crucial need. The most efficient tool for the protection of information is cryptography, used in a combination with other tools for assuring the security of information in all of its applications, including user authentication, data integrity and confidentiality. This book is a compilation of in-depth research work in the field of cryptography. It describes some of the crucial challenges faced by the present computing world as well as a few techniques to defend against these challenges. It aims at serving as a useful source of reference for engineers, graduate and doctoral students, researchers, faculty members of universities, etc.








