Cryptography And Network Security

Cryptography And Network Security Cryptography And Network Security Sample PDF Download
48% Off

Publisher: PHI Learning
ISBN: 9788120350458
Number of Pages: 480
Availability: In Stock
₹450.00 ₹236.25 ( 48% Off )
Effective Price after using Coupon Code: DIWALI2017
Download & Read Books Offline (Desktop/Laptop/Android Device) : Desktop App Android App
Customers who Bought this Ebook also Bought
  • Snapshot
  • Description
About The Book Cryptography And Network Security
Book Summary:

The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.

Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.

Key Features

The subject matter is illustrated with about 200 figures and numerous examples at every stage of learning.
The list of recommended books, technical articles, and standards is included chapter-wise at the end of the book.
An exhaustive glossary and a list of frequently used acronyms are also given.
The book is based on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509 etc.).

Table of Contents:

Preface Abbreviations

1. Introduction to Network Security

2. Mathematical Foundations I (Modular Arithmetic)

3. Classical Encryption Techniques

4. Symmetric-key Ciphers I: Data Encryption Standard

5. Mathematical Foundations II (Finite Fields)

6. Symmetric-key Ciphers II: Advanced Encryption Standard

7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)

8. Mathematical Foundations III (Prime Numbers)

9. Asymmetric-key Cryptosystems

10. Elliptic Curve Cryptography

11. Message Authentication

12. Digital Signatures

13. Entity Authentication

14. Symmetric-key Distribution

15. Public-key Distribution

16. Email Security

17. Transport Layer Security (TLS)

18. IP Security

19. Internet Key Exchange (IKE)

20. Wireless LAN Security

21. Network Vulnerabilities

22. Firewalls and Intrusion Detection Systems

23. Malware

Appendix A1: Prime Numbers, Primitive Roots, Irreducible Polynomials

Appendix A2: Birthday Problems

Appendix A3: Networking Protocols for User Authentication

Glossary Answers to Selected Problems Index