Skip to main content

Data Privacy and Security

  • Book
  • © 2003

Overview

  • Incorporates both data encryption and data hiding in a single volume
  • Supplies many exercises and solutions to support learning the material
  • Presents information in an accessible way
  • Concentrates on specific methodologies that readers can choose from and pursue
  • Includes supplementary material: sn.pub/extras

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (13 chapters)

  1. Introduction

  2. Data Encryption

  3. Data Hiding

Keywords

About this book

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Features & Benefits:

* Incorporates both data encryption and data hiding

* Supplies a wealth of exercises and solutions to help readers readily understand the material

* Presents information in an accessible, nonmathematical style

* Concentrates on specific methodologies that readers can choose from and pursue, for their data-security needs and goals

* Describes new topics, such as the advanced encryption standard (Rijndael), quantum cryptography, and elliptic-curve cryptography.

The book, with its accessible style, is an essential companion for all security practitioners and professionals who need to understand and effectively use both information hiding and encryption to protect digital data and communications. It is also suitable for self-study in the areas of programming, software engineering, and security.

Reviews

From the reviews:

"If you are interested in crypto but lack the advanced math skills, this book will be very helpful. There are full discussions of the history of encryption going back to Ancient Egypt and Ancient Greece through the early modern science period to modern days....It is one of the better presentations of cryptography because of the scholarship that went into producing it." --IEEE Cipher

"This integrated volume focuses on keeping data secure and private and covers classical cryptography, modern cryptography, and steganography. … there are numerous examples to reinforce the reader’s understanding and expertise with these techniques and methodologies. … an excellent 9-page Cryptography Timeline, 12-page Glossary, 12-page Bibliography and an Index. Salomon has written an excellent volume that can serve as a textbook or a worthwhile addition to your personal library." (Cryptologia, Vol. 28 (4), 2004)

 

Authors and Affiliations

  • Department of Computer Science, California State University, Northridge, Northridge, USA

    David Salomon

Bibliographic Information

  • Book Title: Data Privacy and Security

  • Authors: David Salomon

  • DOI: https://doi.org/10.1007/978-0-387-21707-9

  • Publisher: Springer New York, NY

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer Science+Business Media New York 2003

  • Hardcover ISBN: 978-0-387-00311-5

  • Softcover ISBN: 978-1-4419-1816-1

  • eBook ISBN: 978-0-387-21707-9

  • Edition Number: 1

  • Number of Pages: XIV, 465

  • Number of Illustrations: 45 b/w illustrations

  • Topics: Cryptology, Data Structures and Information Theory, Coding and Information Theory

Publish with us