This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendix covers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
This textbook integrates the most advanced topics of physical-layer security, cryptography, covert/stealth communications, quantum key distribution (QKD), and cyber security to tackle complex security issues. After introducing the reader to various concepts and practices, the author addresses how these can work together to target problems, rather than treating them as separate disciplines. This book offers students an in-depth exposition on: cryptography, information-theoretic approach to cryptography, physical-layer security, covert/stealth/low-probability of detection communications, quantum information theory, QKD, and cyber security; to mention few. The goal is to provide a unified description of the most advanced topics related to: (i) modern cryptography, (ii) physical-layer security, (iii) QKD, (iv) covert communications, and (v) cyber security. Each chapter is followed by a set of problems. Also, for readers to better understand the book, an appendixcovers all needed background. Homework problems and lecture notes are available online. The book does not require any prior knowledge or prerequisite material.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 3,41 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: Books Puddle, New York, NY, USA
Zustand: New. Bestandsnummer des Verkäufers 26376778583
Anzahl: 4 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. Print on Demand. Bestandsnummer des Verkäufers 369266824
Anzahl: 4 verfügbar
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND. Bestandsnummer des Verkäufers 18376778589
Anzahl: 4 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
Hardcover. Zustand: New. New. book. Bestandsnummer des Verkäufers ERICA77330302756476
Anzahl: 1 verfügbar