| 000 | 04556nam a22004935i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-23804-3 | ||
| 003 | DE-He213 | ||
| 005 | 20250710083929.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2005 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387238043 _a99780387238043 |
||
| 024 | 7 |
_a10.1007/b102531 _2doi |
|
| 082 | 0 | 4 |
_a003.54 _223 |
| 100 | 1 |
_aSalomon, David. _eauthor. |
|
| 245 | 1 | 0 |
_aCoding for Data and Computer Communications _h[recurso electrónico] / _cby David Salomon. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2005. |
|
| 300 |
_aXV, 548 p. _bonline resource. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aChannel Coding -- Error-Control Codes -- Check Digits for Error Detection -- Source Codes -- Statistical Methods -- Dictionary Methods -- Image Compression -- Secure Codes -- Basic Concepts -- Monoalphabetic Substitution Ciphers -- Transposition Ciphers -- Polyalphabetic Substitution Ciphers -- Stream Ciphers -- Block Ciphers -- Public-Key Cryptography -- Data Hiding -- Data Hiding in Images -- Data Hiding: Other Methods. | |
| 520 | _aDigital data is heavily used when generating, storing, and transmitting information, and special codes are used to represent the data and to control its size, reliability, and security. Data coding is therefore a highly important, and indeed increasingly critical, discipline for data and computer communications. In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting codes), secure coding (cryptography), and source coding (data compression). It is organized in three main parts and uses clear, nonmathematical explanations to develop the concepts, principles, and techniques in each area of coding. Requiring only a general familiarity with computer methods, the book deals with all aspects of coding and its relevance to fast, secure, and reliable data transmission and storage. Features & Benefits: *Presents comprehensive coverage of areas of coding often found in separate books, and stresses data coding's relevance in today's world *Provides a wealth of examples and exercises (with solutions) to help readers easily grasp the material *Incorporates an extensive chapter on data hiding, a sparsely documented topic of increasing importance in the community *Includes an author-supplied website with supplementary material *Possesses a detailed bibliography and helpful glossary, index, and appendixes (including projects for self-study). Computer scientists, electrical engineers, and other professionals will find this up-to-date, accessible volume an essential resource about key areas, problems, and methods associated with data coding. Its straightforward approach also makes it very suitable for students taking courses on computer networks, coding and encryption, data communications, and information theory and coding. David Salomon is a professor emeritus of computer science at California State University, Northridge. He has authored numerous articles and books, including Data Compression: The Complete Reference (Third Edition), Guide to Data Compression Methods, and Data Privacy and Security, and Computer Graphics and Geometric Modeling. Key Topics: >> Error-control codes >> Image compression methods >> Cipher types >> Public-key cryptography >> Check digits >> Error detection >> Statistical methods of source coding >> Steganography (data hiding) >> Encryption codes >> Security / Cryptography >> Beginning / Intermediate | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 0 | _aINFORMATION SYSTEMS. | |
| 650 | 0 | _aINFORMATION STORAGE AND RETRIEVAL SYSTEMS. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STORAGE REPRESENTATION. |
| 650 | 2 | 4 | _aINFORMATION STORAGE AND RETRIEVAL. |
| 650 | 2 | 4 | _aINFORMATION SYSTEMS AND COMMUNICATION SERVICE. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387212456 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/b102531 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c56263 _d56263 |
||