Cryptography And Network Security

By Ajay Raj Parashar And Deepti Mittal more
3222 Views
Selling Price : ₹49.40
MRP : ₹175.00
You will save : ₹125.60 after 72% Discount

Buy Ebook₹99.75 Rental Ebook Up to 72% Off Buy Chapters ₹33.25 per Chp
Select your rental days
Enter your email id to read this ebook
Submit
Select your chapters
Chapter Number Chapter Name Price Select
Chapter 1 INTRODUCTION TO SYMMETRIC ENCRYPTION ₹33.25
Chapter 2 GROUPS, RINGS AND FIELDS ₹33.25
Chapter 3 MESSAGE AUTHENTICATION AND HASH FUNCTIONS ₹33.25
Chapter 4 AUTHENTICATION APPLICATIONS ₹33.25
Chapter 5 NETWORK AND SYSTEM SECURITY ₹33.25

Save extra with 3 Offers

Get ₹ 50

Instant Cashback on the purchase of ₹ 400 or above
SAFE5 Already Applied

NEW35

Get Flat 35% Off on your First Order

Product Specifications

Publisher Laxmi Publications All Computer Networking books by Laxmi Publications
ISBN 9789351382669
Author: Ajay Raj Parashar And Deepti Mittal
Number of Pages 205
Edition First Edition
Available
Available in all digital devices
  • Snapshot
  • About the book
  • Sample book
Cryptography And Network Security - Page 1 Cryptography And Network Security - Page 2 Cryptography And Network Security - Page 3 Cryptography And Network Security - Page 4 Cryptography And Network Security - Page 5

Cryptography And Network Security by Ajay Raj Parashar And Deepti Mittal
Book Summary:

Many engineers consider cryptography to be a sort of magic security dust that they can sprinkle over their hardware or software, and which will imbue those products with the mythical property of ""security."" Security is only as strong as the weakest link, and the mathematics of cryptography is almost never the weakest link. The fundamentals of cryptography are important, but far more important are, how those fundamentals are implemented and used. You can argue whether the stake should be a mile or a mile-and-a-half high, but the attacker is simply going to walk around the stake. Security is a broad stockade: it's the things around the cryptography that make the cryptography effective.

Audience of the Book :
This book Useful for Computer Science students.
Table of Contents:

1. INTRODUCTION TO SYMMETRIC ENCRYPTION

2. GROUPS, RINGS AND FIELDS

3. MESSAGE AUTHENTICATION AND HASH FUNCTIONS

4. AUTHENTICATION APPLICATIONS

5. NETWORK AND SYSTEM SECURITY

    PAPERS

x

Sold Just Now! 🔥

Ramesh Purchased Legal Aspects Of Business, just now!