LEADER 03099nam 2200637I 450 001 9910792138303321 005 20200520144314.0 010 $a0-429-09429-9 010 $a1-4398-4036-9 035 $a(CKB)2560000000251379 035 $a(EBL)1575384 035 $a(SSID)ssj0001111022 035 $a(PQKBManifestationID)11639683 035 $a(PQKBTitleCode)TC0001111022 035 $a(PQKBWorkID)11128456 035 $a(PQKB)10780413 035 $a(Au-PeEL)EBL1575384 035 $a(CaPaEBR)ebr11167023 035 $a(OCoLC)902693366 035 $a(OCoLC)860805565 035 $a(CaSebORM)9781439840375 035 $a(MiAaPQ)EBC1575384 035 $a(EXLCZ)992560000000251379 100 $a20180611d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCommunication system security /$fby Lidong Chen and Guang Gong 205 $a1st edition 210 1$aBoca Raton, FL :$cChapman and Hall/CRC, an imprint of Taylor and Francis,$d2012. 215 $a1 online resource (738 p.) 225 1 $aChapman & Hall/CRC Cryptography and Network Security 225 0 $aA Chapman & Hall Book 300 $aDescription based upon print version of record. 311 $a1-4398-4037-7 311 $a1-322-61613-2 320 $aIncludes bibliographical references at the end of each chapters. 327 $aFront Cover; Contents; Preface; Acknowledgments; 1. Introduction; I. Practical Cryptography Primitives; 2. Pseudorandom Sequence Generators; 3. Design of Stream Ciphers; 4. Design of Block Ciphers, Hash Functions, and MAC; 5. Public-Key Cryptographic Algorithms; II. Security Mechanisms and Protocols; 6. Security Infrastructure; 7. Establish Protected Communications; 8. Network Security Protocols; III. Wireless Security; 9. Network Access Authentication; 10. Wireless Network Security; 11. Security for Mobility; 12. Broadcast and Multicast Key Distribution and Authentication 327 $aIV. System Security13. Trusted Platform; 14. Physical-Layer Security; 15. Spread-Spectrum Techniques for Anti-Jamming-Attacks; APPENDICES; A. Computations in Finite Fields; B. Some Mathematical Formulae; C. Signals and Spectra in Physical Layer 330 3 $aHelping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. 410 0$aChapman & Hall/CRC cryptography and network security. 606 $aTelecommunication$xSecurity measures 615 0$aTelecommunication$xSecurity measures. 676 $a621.389/28 686 $aCOM046000$aCOM083000$aTEC061000$2bisacsh 700 $aChen$b Lidong$01579887 702 $aGong$b Guang$f1956- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910792138303321 996 $aCommunication system security$93860277 997 $aUNINA LEADER 03318oam 22004693 450 001 9910795834303321 005 20220831112152.0 010 $a9781118896143$b(electronic bk.) 010 $z9781405193405 035 $a(MiAaPQ)EBC3563941 035 $a(Au-PeEL)EBL3563941 035 $a(CaPaEBR)ebr11072196 035 $a(OCoLC)932319960 035 $a(EXLCZ)9917757641600041 100 $a20220831d2015 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEmpire, Colony, Postcolony 210 1$aHoboken :$cJohn Wiley & Sons, Incorporated,$d2015. 210 4$d©2015. 215 $a1 online resource (223 pages) 311 08$aPrint version: Young, Robert J. C. Empire, Colony, Postcolony Hoboken : John Wiley & Sons, Incorporated,c2015 9781405193405 327 $aIntro -- Title Page -- Copyright Page -- Contents -- Acknowledgments -- Chapter 1 Introduction -- I -- II -- Note -- Chapter 2 Empire -- Empire and Civilization -- The Geography of Empire: Land vs. Global Maritime Empires -- The Governance of Empire -- Two Models of Empire -- Empires and Diversity -- Notes -- Chapter 3 Colony -- The Temporality of Colonization -- The Colony as Settlement -- Colonization, Migration, and Indigenous Peoples -- Colonizer and Colonized: Intimate Enemies -- The Colony as Trading Factory -- The Colony as the Laboratory of Modernity -- Note -- Chapter 4 Slavery and Race -- Slavery -- Race -- Note -- Chapter 5 Colonialism and Imperialism -- Colonialism -- Imperialism -- Imperialism without Colonies -- Chapter 6 Nation -- The Nation as the Product of Colonial Expansion -- The Nation and Human Rights -- The Nation, Human Rights, and Slavery -- Notes -- Chapter 7 Nationalism -- Chapter 8 Anticolonialism -- Anticolonialism -- Anticolonial Nationalism: Italy and Ireland -- The Bolshevik Revolution, 1917 -- Strategies of Resistance: Rebellion or Reform -- Culture as Soft Power -- On National Culture -- Chapter 9 Decolonization -- Phase One: 1776-1826 -- Phase Two: 1826-1945 -- Phase Three: 1945-Present -- Chapter 10 Neo-colonialism, Globalization, Planetarity -- Neo-colonialism -- Globalization: Free Trade and Advanced Technology -- Economics -- Politics and Human Rights -- Resistance to Globalization -- The University -- The Anti-Globalization Movements -- Islamism -- Planetarity -- Notes -- Chapter 11 Postcolony -- The Postcolony as Former Colony -- Ethnic Diversity -- Law, Education, and Language -- The Settler Postcolony -- The Postcolony as a Zone of Dysfunction -- Notes -- Chapter 12 Postcolonialism -- Knowledge and Theory -- Orientalism -- Culture -- Language and Translation -- Race, Ethnicity, Identity -- Subalternity. 327 $aIndigeneity -- Nomadism -- Migration -- Notes -- References -- Name Index -- Subject Index -- EULA. 606 $aColonies 606 $aImperialism 606 $aPostcolonialism 608 $aElectronic books. 615 0$aColonies. 615 0$aImperialism. 615 0$aPostcolonialism. 676 $a325/.3 700 $aYoung$b Robert J. C$0451763 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910795834303321 996 $aEmpire, Colony, Postcolony$93745435 997 $aUNINA