Cryptography and Network Security - A Practical Approach By K.Haribaskar

Cryptography and Network Security - A Practical Approach By K.Haribaskar Cryptography and Network Security - A Practical Approach By K.Haribaskar Sample PDF Download
76% Off
Rental

3783 Views
Publisher: Laxmi Publications
ISBN: 9789381159637
Author:

Available Options ( In Stock )

Rental?
Buy
chapterBuy Chapters
₹195.00 ₹47.20 ( 76% Off )
Effective Price after using Coupon Code: SAVE20
Download & Read Books Offline (Desktop/Laptop/Android Device) : Desktop App Android App
Customers who Bought this Ebook also Bought
  • Buy Chapter
  • Description
Cryptography And Network Security - A Practical Approach By K.Haribaskar
Book Summary:

This book has provided a state of the art text that covers basic issues and principles, as well as surveys cryptographic and network security techniques. The latter part of the book deals with the real-world practice of network security: practical applications that have been implemented and are in use to provide network security. This book would be highly valuable for students and professionals in this field. Besides Anna University and Andhra University, the book covers the syllabus of University of Calicut, Shivaji University and Uttar Pradesh Technical University.

Audience of the Book :
This book Useful for Engineering, Computer Science, Higher Education.
Key Features:
  • A comprehensive update of conventional encryption
  • To understand the concepts of public key encryption
  • New examples in network security tools and applications
  • Expanded view of Elliptic-Curve Cryptography: In depth treatment reflects its wide spread use and importance. 
Table of Contents:

PART 1: SYMMETRIC CIPHERS

1. INTRODUCTION TO NETWORKING

2. CLASSICAL ENCRYPTION TECHNIQUES

3. BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD

4. ADVANCED ENCRYPTION STANDARD

PART 2: ASYMMETRIC CIPHERS

5. NUMBER THEORY

6. PUBLIC-KEY, CRYPTOGRAPHY AND RSA

7. OTHER PUBLIC KEY CRYPTOSYSTEMS

PART 3: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

8. CRYPTOGRAPHIC HASH FUNCTIONS

PART 4: MUTUAL TRUST

9. KEY MANAGEMENT AND DISTRIBUTION

PART 5: NETWORK AND INTERNET SECURITY

10. SYSTEM LEVEL SECURITY

APPENDICES

Appendix 1         The Importance of Standards

Appendix 2         Standards and Regulations

Appendix 3         Internet Standards and the Internet Society

Appendix 4         National Institute of Standards and Technology's

Appendix 5         Standards and Specifications Cited in this Book

Annexure I         Annexure of Chapter 1

Annexure II        Annexure of Chapter 4

Glossary

Index

Related Books (10)