

Prakash C. Gupta is a leading author and consultant on telecom networks. He did his graduation and postgraduation from IIT Delhi.
Meer over Prakash GuptaCryptography and Network Security
Paperback Engels 2015 1e druk 9788120350458Samenvatting
The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.
Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.
Key Features:
- The subject matter is illustrated with about 200 figures and numerous examples at every stage of learning.
- The list of recommended books, technical articles, and standards is included chapter-wise at the end of the book.
- An exhaustive glossary and a list of frequently used acronyms are also given.
- The book is based on the latest versions of the protocols (TLS, IKE, IPsec, S/MIME, Kerberos, X.509 etc.).
Specificaties
Lezersrecensies
Inhoudsopgave
Abbreviations
1. Introduction to Network Security
2. Mathematical Foundations I (Modular Arithmetic)
3. Classical Encryption Techniques
4. Symmetric-key Ciphers I: Data Encryption Standard
5. Mathematical Foundations II (Finite Fields)
6. Symmetric-key Ciphers II: Advanced Encryption Standard
7. Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)
8. Mathematical Foundations III (Prime Numbers)
9. Asymmetric-key Cryptosystems
10. Elliptic Curve Cryptography
11. Message Authentication
12. Digital Signatures
13. Entity Authentication
14. Symmetric-key Distribution
15. Public-key Distribution
16. Email Security
17. Transport Layer Security (TLS)
18. IP Security
19. Internet Key Exchange (IKE)
20. Wireless LAN Security
21. Network Vulnerabilities
22. Firewalls and Intrusion Detection Systems
23. Malware
Appendix A1: Prime Numbers, Primitive Roots, Irreducible Polynomials
Appendix A2: Birthday Problems
Appendix A3: Networking Protocols for User Authentication
Glossary
Answers to Selected Problems
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan