Browse Textbooks in Cryptography & Coding Theory

Cryptography & Coding Theory

PUBLISHED


Viewing: 1 - 10 of 20
Published:
March 18, 2013
Author(s):
Abhijit Das
Developed from the author’s popular graduate-level course, Computational Number Theory presents a complete treatment of number-theoretic algorithms. Avoiding advanced algebra, this self-contained text is designed for advanced undergraduate and beginning graduate students in engineering. It is also 
  Hardback
$89.95
Add to cart
Published:
June 20, 2012
Author(s):
Richard E. Klima; Neil P. Sigmon
Easily Accessible to Students with Nontechnical Backgrounds In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, 
  Hardback
$79.95
Add to cart
Published:
May 24, 2011
Author(s):
Alasdair McAndrew
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the 
  Hardback
$79.95
Add to cart
Published:
August 09, 2010
Author(s):
Alexander Stanoyevitch
From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in 
  Hardback
$89.95
Add to cart
Published:
July 26, 2010
Author(s):
Shiu-Kai Chin; Susan Beth Older
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use 
  Hardback
$99.95
Add to cart
Published:
June 03, 2009
Author(s):
Fred Roberts; Barry Tesman
Now with solutions to selected problems, Applied Combinatorics, Second Edition presents the tools of combinatorics from an applied point of view. This bestselling textbook offers numerous references to the literature of combinatorics and its applications that enable readers to delve more deeply 
  Hardback
$109.95
Add to cart
Published:
April 09, 2009
Author(s):
Adam J. Elbirt
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s 
  Hardback
$83.95
Add to cart
Published:
February 17, 2009
Author(s):
Darel W. Hardy; Fred Richman; Carol L. Walker
Using mathematical tools from number theory and finite fields, Applied Algebra: Codes, Ciphers, and Discrete Algorithms, Second Edition presents practical methods for solving problems in data security and data integrity. It is designed for an applied algebra course for students who have had prior 
  Hardback
$113.95
Add to cart
Published:
November 18, 2008
Author(s):
Douglas Jacobson
Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or 
  Hardback
$91.95
Add to cart
Published:
October 30, 2007
Author(s):
Martin Erickson; Anthony Vazzana
One of the oldest branches of mathematics, number theory is a vast field devoted to studying the properties of whole numbers. Offering a flexible format for a one- or two-semester course, Introduction to Number Theory uses worked examples, numerous exercises, and two popular software packages to 
  Hardback
$99.95
Add to cart

New in Computer Science

Author Invited to Speak at ERSA '11

Professor Shiu-Kai Chin, co-author of Access Control, Security, and Trust: A Logical Approach, will be presenting at the ERSA '11 Conference in Las Vegas this July.

Prof. Chin will be talking about, "Logic Design for Access Control, Security, Trust and Assurance," in the Security: Threats and Solutions area.

Now Available


Encyclopedia of Software Engineering
Edited by Phillip A. Laplante

Call us for special introductory pricing on the print version of this comprehensive encyclopedia.

Also available as an online subscription

---------------

Do you have an idea for a Computer Science book or series? Contact our Editorial Department.

---------------


T & F Journals
Access sample editions from the home pages of most Taylor & Francis journals, including:

Optimization Methods and Software

Applied Artificial Intelligence
Published in cooperation with the Austrian Society for Cybernetic Studies

 


Looking for a complete online reference library on computer science and engineering?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references.


STAY CONNECTED


Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!


Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Textbooks
Other CRC Press Sites
Featured Authors
STAY CONNECTED
Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
Sign Up for Email Alerts
© 2013 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us