Cryptography And Network Security

By Ajay Raj Parashar And Deepti Mittal more
2368 Views
Selling Price : ₹26.00
MRP : ₹175.00
You will save : ₹149.00 after 85% Discount

Buy Ebook₹52.50 Rental Ebook Up to 85% Off Buy Chapters ₹17.50 per Chp
Select your rental days
Enter your email id to read this ebook
Submit
Select your chapters
Chapter Number Chapter Name Price Select
Chapter 1 INTRODUCTION TO SYMMETRIC ENCRYPTION ₹17.50
Chapter 2 GROUPS, RINGS AND FIELDS ₹17.50
Chapter 3 MESSAGE AUTHENTICATION AND HASH FUNCTIONS ₹17.50
Chapter 4 AUTHENTICATION APPLICATIONS ₹17.50
Chapter 5 NETWORK AND SYSTEM SECURITY ₹17.50

Save extra with 3 Offers

Get ₹ 50

Instant Cashback on the purchase of ₹ 400 or above
LAXMI50 Already Applied

NEW35

Get Flat 35% Off on your First Order

Product Specifications

Publisher Laxmi Publications All Computer Networking books by Laxmi Publications
ISBN 9789351382669
Author: Ajay Raj Parashar And Deepti Mittal
Number of Pages 205
Available
Available in all digital devices

Frequently Brought Together

Cryptography And Network Security
Cryptography And Network Security
₹52.50 ₹175.00
Current Selection
Systems Programming & Operating System
Systems Programming & Operating System
₹100.80 ₹160.00
JNTU Study Material For Software Engineering (Computer Science Engineering)
JNTU Study Material For Software Engineering (Computer Science Engineering)
₹18.00 ₹160.00
Selected items : 2
Offer Price : You Save :
  • Snapshot
  • About the book
Cryptography And Network Security - Page 1 Cryptography And Network Security - Page 2 Cryptography And Network Security - Page 3 Cryptography And Network Security - Page 4 Cryptography And Network Security - Page 5

Cryptography And Network Security by Ajay Raj Parashar And Deepti Mittal
Book Summary:

Many engineers consider cryptography to be a sort of magic security dust that they can sprinkle over their hardware or software, and which will imbue those products with the mythical property of ""security."" Security is only as strong as the weakest link, and the mathematics of cryptography is almost never the weakest link. The fundamentals of cryptography are important, but far more important are, how those fundamentals are implemented and used. You can argue whether the stake should be a mile or a mile-and-a-half high, but the attacker is simply going to walk around the stake. Security is a broad stockade: it's the things around the cryptography that make the cryptography effective.

Audience of the Book :
This book Useful for Computer Science students.
Table of Contents:

1. INTRODUCTION TO SYMMETRIC ENCRYPTION

2. GROUPS, RINGS AND FIELDS

3. MESSAGE AUTHENTICATION AND HASH FUNCTIONS

4. AUTHENTICATION APPLICATIONS

5. NETWORK AND SYSTEM SECURITY

    PAPERS

x