Buch, Englisch, 548 Seiten, Paperback, Format (B × H): 181 mm x 235 mm, Gewicht: 1068 g
Buch, Englisch, 548 Seiten, Paperback, Format (B × H): 181 mm x 235 mm, Gewicht: 1068 g
ISBN: 978-1-4419-3546-5
Verlag: Springer US
Coding for Data and Computer Communications avoids the complex mathematics, favoring the core concepts, principles, and methods of channel codes (for error correction), source codes (for compressing data), and secure codes (for data privacy). The most important approaches and techniques used to make the storage and transmission of information (data) fast, secure, and reliable are examined.
This book is an essential resource for all security researchers and professionals who need to understand and effectively use coding employed in computers and data communications. Anchored by a clear, nonmathematical exposition, all the major topics, principles, and methods are presented in an accessible style suitable for professional specialists, nonspecialists, students, and individual self-study.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerkprotokolle
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Datenkompression, Dokumentaustauschformate
Weitere Infos & Material
Channel Coding.- Error-Control Codes.- Check Digits for Error Detection.- Source Codes.- Statistical Methods.- Dictionary Methods.- Image Compression.- Secure Codes.- Basic Concepts.- Monoalphabetic Substitution Ciphers.- Transposition Ciphers.- Polyalphabetic Substitution Ciphers.- Stream Ciphers.- Block Ciphers.- Public-Key Cryptography.- Data Hiding.- Data Hiding in Images.- Data Hiding: Other Methods.