Anonymous Communication Networks: Protecting Privacy on the Web
Peng, Kun
Venduto da Majestic Books, Hounslow, Regno Unito
Venditore AbeBooks dal 19 gennaio 2007
Nuovi - Brossura
Condizione: Nuovo
Quantità: 3 disponibili
Aggiungere al carrelloVenduto da Majestic Books, Hounslow, Regno Unito
Venditore AbeBooks dal 19 gennaio 2007
Condizione: Nuovo
Quantità: 3 disponibili
Aggiungere al carrelloIn today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with each other without revealing their identities.
The book explores various anonymous communication networks as possible solutions to Internet privacy concerns―making it ideal for network researchers and anyone interested in protecting their privacy or the privacy of their users. Identifying specific scenarios where it is best to be anonymous, it details the two main approaches to anonymous communication networks: onion routing and mixed networks.
Using examples and case studies, the book illustrates the usefulness of anonymous communication networks for web browsing, email, e-banking, and e-voting. It explains how to obtain anonymous usage permits for cloud software and analyzes the spectrum of existing techniques for anonymous cyber surfing. The text concludes by examining future directions to supply you with the understanding required to ensure anonymous Internet browsing.
Dr. Kun Peng received his bachelor’s degree in software and master’s degree in computer security from Huazhong University of Science and Technology, China. He graduated from the Information Security Institute, Queensland University of Technology, Australia, in 2004, obtaining his PhD degree in information security. His main research interest is in applied public key cryptology. His main research interests include applied cryptology, network security, secure e-commerce, and e-government.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Visita la pagina della libreria
Returns accepted if you are not satisfied with the Service or Book.
Best packaging and fast delivery
Quantità dell?ordine | Da 14 a 45 giorni lavorativi | Da 5 a 10 giorni lavorativi |
---|---|---|
Primo articolo | EUR 7.45 | EUR 11.28 |
I tempi di consegna sono stabiliti dai venditori e variano in base al corriere e al paese. Gli ordini che devono attraversare una dogana possono subire ritardi e spetta agli acquirenti pagare eventuali tariffe o dazi associati. I venditori possono contattarti in merito ad addebiti aggiuntivi dovuti a eventuali maggiorazioni dei costi di spedizione dei tuoi articoli.