This book is specifically written with an intention to make the readers about visualizing the cryptographic methods and algorithms in a mathematical way on how to apply those in various security preferred real time applications. The targeted audience are under graduate students, post graduate students, research professionals working in network security domain and even for corporate who focuses on securing their network architecture using cryptographic methods and algorithms. This book is created with simple hands-on examples to provide better clarity for the readers.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.