Cryptography And Network Security

Cryptography And Network Security

( 51 )
Sold ( 52 times )
11673 Views

This product is currently not available.

Save extra with 1 Offers

Get ₹ 50

Instant Cashback on the purchase of ₹ 400 or above

Product Specifications

Publisher PHI Learning All Computer Science books by PHI Learning
ISBN 9788120350458
Author: GUPTA, PRAKASH C.
Number of Pages 480
Available
Available in all digital devices
  • Snapshot
  • About the book
  • Sample book
Cryptography And Network Security - Page 1 Cryptography And Network Security - Page 2 Cryptography And Network Security - Page 3 Cryptography And Network Security - Page 4 Cryptography And Network Security - Page 5

About The Book Cryptography And Network Security

Book Summary:

The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.

Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.


Key Features

The subject matter is illustrated with about 200 figures and numerous examples at every stage of learning.
The list of recommended books, technical articles, and standards is included chapter-wise at the end of the book.
An exhaustive glossary and a list of frequently used acronyms are also given.
The book is based on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509 etc.).


Table of Contents:

Preface Abbreviations

1. Introduction to Network Security

2. Mathematical Foundations I (Modular Arithmetic)

3. Classical Encryption Techniques

4. Symmetric-key Ciphers I: Data Encryption Standard

5. Mathematical Foundations II (Finite Fields)

6. Symmetric-key Ciphers II: Advanced Encryption Standard

7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)

8. Mathematical Foundations III (Prime Numbers)

9. Asymmetric-key Cryptosystems

10. Elliptic Curve Cryptography

11. Message Authentication

12. Digital Signatures

13. Entity Authentication

14. Symmetric-key Distribution

15. Public-key Distribution

16. Email Security

17. Transport Layer Security (TLS)

18. IP Security

19. Internet Key Exchange (IKE)

20. Wireless LAN Security

21. Network Vulnerabilities

22. Firewalls and Intrusion Detection Systems

23. Malware

Appendix A1: Prime Numbers, Primitive Roots, Irreducible Polynomials

Appendix A2: Birthday Problems

Appendix A3: Networking Protocols for User Authentication

Glossary Answers to Selected Problems Index