Защита информации методами криптографии, стеганографии и обфускации
[Data protection by the methods of cryptography, steganography and obfuscation]

Podręcznik akademicki

Miejsce: Minsk
Rok wydania: 2016
Streszczenie: The basic concepts relating to the problem of protecting information in computer systems and networks, directions and methods of developing security policies of organizations and institutions are described. The mathematical foundations of cryptography, steganography and obfuscation methods are considered, and specific examples show algorithms and methods for the practical implementation of these methods for encryption/decryption data, protection intellectual property rights in text documents, databases and program codes, generating of electronic digital signature and verifying it.
Słowa kluczowe: protection of information, information security, security threats, cryptography, substitutional ciphers, permutational ciphers, symmetric ciphers, asymmetric ciphers, DES algorithm, RSA algorithm, El-Gamal algorithm, stream ciphers, steganography systems, electronic digital signature, obfuscation methods, code protection methods
Dostęp WWW: http://elib.belstu.by/handle/123456789/23763