menu
{ "item_title" : "Information security With resolved Exercises", "item_author" : [" Brahim Lejdel "], "item_description" : "This book presents a foundational exploration of information security through the lens of cryptography, moving from classical to modern systems. It begins by illustrating symmetric key encryption with the Hill cipher, which transforms data using linear algebra, and introduces the concept of perfect secrecy with the one-time pad, while noting its practical limitations in key management. The core of the text then delves into public-key cryptography, exemplified by RSA, which solves the key distribution problem through mathematically linked public and private keys. Throughout the examples, the book emphasizes critical practical lessons: the necessity of using sufficiently large keys, the importance of proper encoding and padding, and the fact that security relies not only on strong algorithms but also on robust implementation and key protection. Ultimately, it frames information security as a dynamic, layered discipline that requires constant adaptation to balance confidentiality, integrity, and availability against evolving threats.", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/6/20/952/207/6209522076_b.jpg", "price_data" : { "retail_price" : "50.92", "online_price" : "50.92", "our_price" : "50.92", "club_price" : "50.92", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Information security With resolved Exercises|Brahim Lejdel

Information security With resolved Exercises

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book presents a foundational exploration of information security through the lens of cryptography, moving from classical to modern systems. It begins by illustrating symmetric key encryption with the Hill cipher, which transforms data using linear algebra, and introduces the concept of perfect secrecy with the one-time pad, while noting its practical limitations in key management. The core of the text then delves into public-key cryptography, exemplified by RSA, which solves the key distribution problem through mathematically linked public and private keys. Throughout the examples, the book emphasizes critical practical lessons: the necessity of using sufficiently large keys, the importance of proper encoding and padding, and the fact that security relies not only on strong algorithms but also on robust implementation and key protection. Ultimately, it frames information security as a dynamic, layered discipline that requires constant adaptation to balance confidentiality, integrity, and availability against evolving threats.

This item is Non-Returnable

Details

  • ISBN-13: 9786209522079
  • ISBN-10: 6209522076
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: January 2026
  • Dimensions: 9 x 6 x 0.12 inches
  • Shipping Weight: 0.18 pounds
  • Page Count: 52

Related Categories

You May Also Like...

    1

BAM Customer Reviews