Skip to content
Publish & Distribute
Publishing Solutions
Distribution Solutions
Library Services
Subjects
Architecture and Design
Arts
Business and Economics
Chemistry
Classical and Ancient Near Eastern Studies
Computer Sciences
Cultural Studies
Engineering
General Interest
Geosciences
History
Industrial Chemistry
Jewish Studies
Law
Library and Information Science, Book Studies
Life Sciences
Linguistics and Semiotics
Literary Studies
Materials Sciences
Mathematics
Medicine
Music
Pharmacy
Philosophy
Physics
Social Sciences
Sports and Recreation
Theology and Religion
Publications
Journals
Books
Proceedings
Publishers
Journal Matcher
Blog
Contact
Search
English
English
Deutsch
Polski
Español
Français
Italiano
Cart
Home
Books
Computer Security and Encryption
Requires Authorization
Computer Security and Encryption
An Introduction
S. R. Chauhan
S. R. Chauhan
Search for this author on
Sciendo
|
Google Scholar
Chauhan, S. R.
and
S. Jangra
S. Jangra
Search for this author on
Sciendo
|
Google Scholar
Jangra, S.
Publisher:
Mercury Learning and Information
Cite
Share
Download Cover
Description
Table of
Contents
Keywords
cybercrime
,
big data analytics
,
cryptography
,
inter-object communications
,
security models
,
system security
,
iot
,
cloud
,
public key crypto
,
wsn
,
internet of things
,
firewall
,
vpn
,
ipsec
,
control systems
,
network design
,
object model communications
,
smart grid
,
scada
Description
Table of Contents
Keywords
cybercrime
,
big data analytics
,
cryptography
,
inter-object communications
,
security models
,
system security
,
iot
,
cloud
,
public key crypto
,
wsn
,
internet of things
,
firewall
,
vpn
,
ipsec
,
control systems
,
network design
,
object model communications
,
smart grid
,
scada
People Also Read