
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | Cryptography And Net... |
ISBN
:
9788177587746
Publisher
:
Pearson
Subject
:
Computer Science, null
Binding
:
Paperback
Pages
:
698
Year
:
2011
₹
290.0
₹
290.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. For Sale in Indian subcontinent only Features Consistent chapter pedagogy – Each chapter includes homework problems, review questions, a list of key words, suggestions for further reading, and recommended Web sites. Detailed, chapter-by-chapter summary of each part– Appears at the beginning of that part. Abundant homework and class-work assignment material An extensive glossary, a list of frequently used acronyms, and a bibliography. Simplified AES (Advanced Encryption Standard) – An educational, simplified version of AES, that enables students to grasp the essentials of AES more easily. New block cipher modes of operation – Includes the CMAC mode for authentication and the CCM mode for authenticated encryption. Expanded, updated treatment of intruders and malicious software. Coverage of the essential new topic of public key infrastructure (PKI). Updated, expanded content throughout to bring material up to date. New Online Appendices that supplement the material in the book. Writing assignments – Now included in the instructor's material to facilitate learning and expand instructor options. Programming assignments – Now includes a number of end-of-chapter programming assignments that can be programmed in any language; facilitates learning and expand instructor options. Laboratory exercises – Adds a new set of lab exercises to the instructor package Approximately 50% more end-of-chapter homework problems. Table of Content Notation Preface Reader's Guide SYMMETRIC CIPHERS Overview Classical Encryption Techniques Block Ciphers and the Data Encryption Standard Introduction to Finite Fields Advanced Encryption Standard More on Symmetric Ciphers Confidentiality Using Symmetric Encryption PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS Introduction to Number Theory Public-Key Cryptography and RSA Key Management; Other Public-Key Cryptosystems Message Authentication and Hash Functions Hash and Mac Algorithms Digital Signatures and Authentication Protocols NETWORK SECURITY PRACTICE Authentication Applications Electronic Mail Security IP Security Web Security SYSTEM SECURITY Intruders Malicious Software FirewallsAPPENDICES Appendix A. Standards and Standard-Setting Organizations Appendix B. Projects for Teaching Cryptography and Network Security Online Appendices Appendix C. Simplified Des Appendix D. The Meaning of Mod Appendix E. More on Simplified AES Appendix F. Knapsack Public-Key Algorithm Appendix G. Proof of The Digital Signature Algorithm Glossary References Index List of Acronyms
Related Items
-
of
Neural Networks and Artificial Intelligence for Biomedical Engineering
Donna L. Hudson
Starts At
15918.0
18510.0
14% OFF
Godel, Escher, Bach: An Eternal Golden Braid, 20th Anniversary Edition
Douglas R. Hofstadter
Starts At
813.0
1099.0
26% OFF
Designing Concurrent, Distributed, and Real-Time Applications with UML
Hassan Gomaa
Starts At
6079.0
7999.0
24% OFF
Artificial Life V: Proceedings of the Fifth International Workshop on the Synthesis and Simulation of Living Systems (Complex Adaptive Systems)
Christopher G. Langton
Starts At
6602.0
7677.0
14% OFF