CRYPTOGRAPHY AND NETWORK SECURITY
The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. This comprehensive text is self-contained and covers all aspects of network security.Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.Key features:Illustrated with about 200 figures and numerous examples at every stage of learningList of recommended books, technical articles, and standardsAn exhaustive glossary and a list of frequently used acronymsBased on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509)Read more
1122292787
CRYPTOGRAPHY AND NETWORK SECURITY
The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. This comprehensive text is self-contained and covers all aspects of network security.Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.Key features:Illustrated with about 200 figures and numerous examples at every stage of learningList of recommended books, technical articles, and standardsAn exhaustive glossary and a list of frequently used acronymsBased on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509)Read more
6.82 In Stock
CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

by PRAKASH C. GUPTA
CRYPTOGRAPHY AND NETWORK SECURITY

CRYPTOGRAPHY AND NETWORK SECURITY

by PRAKASH C. GUPTA

eBook

$6.82 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers

LEND ME® See Details

Overview

The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. This comprehensive text is self-contained and covers all aspects of network security.Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.Key features:Illustrated with about 200 figures and numerous examples at every stage of learningList of recommended books, technical articles, and standardsAn exhaustive glossary and a list of frequently used acronymsBased on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509)Read more

Product Details

ISBN-13: 9788120350458
Publisher: PHI Learning
Publication date: 11/01/2014
Sold by: Barnes & Noble
Format: eBook
File size: 6 MB

About the Author

PRAKASH C. GUPTA is a leading author and consultant on telecom networks. He did his graduation and postgraduation from IIT Delhi. He has rich and varied experience of research, engineering and operating telecommunication networks. He was Deputy Director General, Department of Telecom, Head Data Networks, Reliance Communications, Head of Department (IT), Maharashtra Institute of Technology, Pune. He received Gold Medal for his services from Department of Telecom, Ministry of Communications. He has been active participant and contributor in national and international forums.

Table of Contents

Preface • Abbreviations1. Introduction to Network Security2. Mathematical Foundations I (Modular Arithmetic)3. Classical Encryption Techniques4. Symmetric-key Ciphers I: Data Encryption Standard5. Mathematical Foundations II (Finite Fields)6. Symmetric-key Ciphers II: Advanced Encryption Standard7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)8. Mathematical Foundations III (Prime Numbers)9. Asymmetric-key Cryptosystems10. Elliptic Curve Cryptography11. Message Authentication12. Digital Signatures13. Entity Authentication14. Symmetric-key Distribution15. Public-key Distribution16. Email Security17. Transport Layer Security (TLS)18. IP Security19. Internet Key Exchange (IKE)20. Wireless LAN Security21. Network Vulnerabilities22. Firewalls and Intrusion Detection Systems23. MalwareAppendix A1: Prime Numbers, Primitive Roots, Irreducible PolynomialsAppendix A2: Birthday ProblemsAppendix A3: Networking Protocols for User AuthenticationGlossary • Answers to Selected Problems • Index
From the B&N Reads Blog

Customer Reviews