Anonymous Communication Networks
Kun Peng
Verkauft von PBShop.store US, Wood Dale, IL, USA
AbeBooks-Verkäufer seit 7. April 2005
Neu - Hardcover
Zustand: Neu
Anzahl: 1 verfügbar
In den Warenkorb legenVerkauft von PBShop.store US, Wood Dale, IL, USA
AbeBooks-Verkäufer seit 7. April 2005
Zustand: Neu
Anzahl: 1 verfügbar
In den Warenkorb legenNew Book. Shipped from UK. Established seller since 2000.
Bestandsnummer des Verkäufers FT-9781439881576
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities.
The book explores various anonymous communication networks as possible solutions to Internet privacy concerns―making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks.
Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
Dr. Kun Peng received his bachelor’s degree in software and master’s degree in computer security from Huazhong University of Science and Technology, China. He graduated from the Information Security Institute, Queensland University of Technology, Australia, in 2004, obtaining his PhD degree in information security. His main research interest is in applied public key cryptology. His main research interests include applied cryptology, network security, secure e-commerce, and e-government.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Returns Policy
We ask all customers to contact us for authorisation should they wish to return their order. Orders returned without authorisation may not be credited.
If you wish to return, please contact us within 14 days of receiving your order to obtain authorisation.
Returns requested beyond this time will not be authorised.
Our team will provide full instructions on how to return your order and once received our returns department will process your refund.
Please note the cost to return any...
Books are shipped from our US or UK warehouses. Delivery estimates allow for delivery from either location.
Bestellmenge | 7 bis 14 Werktage | 7 bis 14 Werktage |
---|---|---|
Erster Artikel | EUR 0.00 | EUR 0.00 |
Die Versandzeiten werden von den Verkäuferinnen und Verkäufern festgelegt. Sie variieren je nach Versanddienstleister und Standort. Sendungen, die den Zoll passieren, können Verzögerungen unterliegen. Eventuell anfallende Abgaben oder Gebühren sind von der Käuferin bzw. dem Käufer zu tragen. Die Verkäuferin bzw. der Verkäufer kann Sie bezüglich zusätzlicher Versandkosten kontaktieren, um einen möglichen Anstieg der Versandkosten für Ihre Artikel auszugleichen.