New ArrivalsHealth & WellnessValentine’s DayClothing, Shoes & AccessoriesHomeKitchen & DiningGroceryHousehold EssentialsFurnitureOutdoor Living & GardenBabyToysVideo GamesElectronicsMovies, Music & BooksBeautyPersonal CareGift IdeasParty SuppliesCharacter ShopSports & OutdoorsBackpacks & LuggageSchool & Office SuppliesPetsUlta Beauty at TargetTarget OpticalGift CardsBullseye’s PlaygroundDealsClearanceTarget New Arrivals Target Finds #TargetStyleStore EventsAsian-Owned Brands at TargetBlack-Owned or Founded Brands at TargetLatino-Owned Brands at TargetWomen-Owned Brands at TargetLGBTQIA+ ShopTop DealsTarget Circle DealsWeekly AdShop Order PickupShop Same Day DeliveryRegistryRedCardTarget CircleFind Stores
Hashing - by  Alan G Konheim (Hardcover) - 1 of 1

Hashing - by Alan G Konheim Hardcover

$171.99

In Stock

Eligible for registries and wish lists

Sponsored

About this item

Highlights

  • Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security.
  • About the Author: Alan G. Konheim, PhD, is Professor Emeritus of Computer Science at the University of Californa, Santa Barbara.
  • 408 Pages
  • Technology, Telecommunications

Description



Book Synopsis



Written by one of the developers of the technology, Hashing is both a historical document on the development of hashing and an analysis of the applications of hashing in a society increasingly concerned with security. The material in this book is based on courses taught by the author, and key points are reinforced in sample problems and an accompanying instructor s manual. Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires.



From the Back Cover



Gain the Skills and Knowledge Needed to Understanding Data Security Systems

A file of computer data is composed of records to each of which a key or identifier is associated. The key is used to search for the address of a desired record. When the file is a telephone directory, searching is easy--the key is the subscriber's name and the records are naturally arranged in alphabetic order. For data whose records are not easily alphabetized, a hash function is used to arithmetically derive from the key record's address. Hashing was invented during the design of the IBM 701 machine in the 1950s by Hans Peter Luhn. In the ensuing half century, the hashing concept has found a variety of applications. When combined with cryptography, hashing can be used to authenticate users in e-commerce on the Web.

Professor Konheim is an authority on computer security and an early contributor to hashing technology. Based on courses taught by the author, this book unravels the complicated mathematics involved in hashing as it explains in detail the various hashing methods. It describes:

  • Techniques for audio fingerprinting, the automated recognition of music
  • The use of hashing in e-commerce to protect against identity theft
  • How hashing is used to inhibit the unlawful copying and distribution of music, video, software, books, and data

Key points are reinforced in the sample problems and solutions provided; also included are an accompanying instructor's manual and extensive bibliography. Hashing in Computer Science is valuable reading for graduate students and researchers in mathematics, cryptography, and security. It can be used as a textbook in senior and graduate courses on cryptography and others that employ cryptanalysis, computer security, analysis of randomized and combinatorial algorithms, computer networks, compiler design, computational geometry, and theory of computation.



Review Quotes




"Graduate students and researchers in mathematics, cryptography, and security will benefit from this overview of hashing and the complicated mathematics that it requires." (Forums Digital Media Net, 27 October 2010)



About the Author



Alan G. Konheim, PhD, is Professor Emeritus of Computer Science at the University of Californa, Santa Barbara. Dr. Konheim's early work at IBM led to the Data Encryption Standard (DES), which was evaluated by his Yorktown Probability and Cryptography Group. DES was certified as a national standard in the 1970s. Dr. Konheim continues to consult the government in the area of cryptanalysis.
Dimensions (Overall): 10.1 Inches (H) x 7.1 Inches (W) x 1.1 Inches (D)
Weight: 2.05 Pounds
Suggested Age: 22 Years and Up
Number of Pages: 408
Genre: Technology
Sub-Genre: Telecommunications
Publisher: Wiley-Interscience
Format: Hardcover
Author: Alan G Konheim
Language: English
Street Date: July 6, 2010
TCIN: 1008778028
UPC: 9780470344736
Item Number (DPCI): 247-13-9120
Origin: Made in the USA or Imported
If the item details aren’t accurate or complete, we want to know about it.

Shipping details

Estimated ship dimensions: 1.1 inches length x 7.1 inches width x 10.1 inches height
Estimated ship weight: 2.05 pounds
We regret that this item cannot be shipped to PO Boxes.
This item cannot be shipped to the following locations: American Samoa (see also separate entry under AS), Guam (see also separate entry under GU), Northern Mariana Islands, Puerto Rico (see also separate entry under PR), United States Minor Outlying Islands, Virgin Islands, U.S., APO/FPO

Return details

This item can be returned to any Target store or Target.com.
This item must be returned within 90 days of the date it was purchased in store, shipped, delivered by a Shipt shopper, or made ready for pickup.
See the return policy for complete information.

Related Categories

Get top deals, latest trends, and more.

Privacy policy

Footer

About Us

About TargetCareersNews & BlogTarget BrandsBullseye ShopSustainability & GovernancePress CenterAdvertise with UsInvestorsAffiliates & PartnersSuppliersTargetPlus

Help

Target HelpReturnsTrack OrdersRecallsContact UsFeedbackAccessibilitySecurity & FraudTeam Member ServicesLegal & Privacy

Stores

Find a StoreClinicPharmacyTarget OpticalMore In-Store Services

Services

Target Circle™Target Circle™ CardTarget Circle 360™Target AppRegistrySame Day DeliveryOrder PickupDrive UpFree 2-Day ShippingShipping & DeliveryMore Services
PinterestFacebookInstagramXYoutubeTiktokTermsCA Supply ChainPrivacy PolicyCA Privacy RightsYour Privacy ChoicesInterest Based AdsHealth Privacy Policy