Cryptography And Information Security

By V. K. Pachghare more
9869 Views
₹236.25 ₹350.00 You will save ₹113.75 after 33% Discount

Add to Wish List

Save extra with 3 Offers

Get ₹ 50 Instant Cashback on the purchase of ₹ 400 or above
SAVE10 Already Applied

NEW50

Get Flat 50% Off on your First Order

Product Specifications

Publisher PHI Learning
ISBN 9788120350823
Author: V. K. Pachghare
Number of Pages 416
Edition Second Edition
Available
Available in all digital devices
  • Snapshot
  • About the book

About The Book Cryptography And Information Security
Book Summary:

This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermats theorem and Eulers theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed.

This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter.

The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).


KEY FEATURES

Covers the latest topic of computer forensics and the areas in which they can be applied.
Gives algorithms with numerical explanations.
Provides a large number of solved problems.


Table of Contents:

Preface

Acknowledgements

1. Introduction

2. Data Encryption Techniques

3. Data Encryption Standards

4. Advanced Encryption Standard

5. Symmetric Ciphers

6. Number Theory

7. Public Key Cryptosystems

8. Key Management

9. Authentication

10. Digital Signatures

11. Electronic Mail Security

12. IP Security

13. Web Security

14. Intrusion

15. Malicious Software

16. Firewall

17. Computer Forensics

Index

 

x