IES Management College And Research Centre

Image from Google Jackets

CRYPTOGRAPHY AND NETWORK SECURITY KAHATE, ATUL

By: Publication details: MCGRAW HILL EDUCATION (INDIA) PRIVATE LIMITED 2003 NEW DELHIEdition: 3Description: XXII, 501 PAPERISBN:
  • 978-1-25-902988-2
Subject(s): DDC classification:
  • 005.8
Contents:
1. Introduction to the Concepts of Security 2. Cryptography Techniques 3. Computer-based Symmetric Key Cryptographic Algorithms 4. Computer-based Asymmetric-Key Cryptography Algorithms 5. Public Key Infrastructure (PKI) 6. Internet-Security Protocols 7. User-Authentication Mechanisms 8. Practical Implementations of Cryptography/Security 9. Network Security, Firewalls, and Virtual Private Networks (VPN) Appendices A. Mathematical Background B. Number Systems C. Information Theory D. Real-life Tools E. Web Resources F. A Brief Introduction to ASN, BER, DER
Summary: In its signature style, the third edition clearly presents all key concepts of the subject like Data Encryption Standard, Ciphers, IP Security and Web Security, via easy-to-follow examples and diagrams, keeping complex mathematical treatments at bay. With ample practical examples, case studies and large number of pedagogy, the book perfectly motivates readers to delve into the application aspects of the subject.
List(s) this item appears in: Recent Additions to the Library- Oct 2013
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Book Book Main Library 005.8/KAH/21830 (Browse shelf(Opens below)) Available 11121830
Total holds: 0

1. Introduction to the Concepts of Security
2. Cryptography Techniques
3. Computer-based Symmetric Key Cryptographic Algorithms
4. Computer-based Asymmetric-Key Cryptography Algorithms
5. Public Key Infrastructure (PKI)
6. Internet-Security Protocols
7. User-Authentication Mechanisms
8. Practical Implementations of Cryptography/Security
9. Network Security, Firewalls, and Virtual Private Networks (VPN)
Appendices
A. Mathematical Background
B. Number Systems
C. Information Theory
D. Real-life Tools
E. Web Resources
F. A Brief Introduction to ASN, BER, DER

In its signature style, the third edition clearly presents all key concepts of the subject like Data Encryption Standard, Ciphers, IP Security and Web Security, via easy-to-follow examples and diagrams, keeping complex mathematical treatments at bay. With ample practical examples, case studies and large number of pedagogy, the book perfectly motivates readers to delve into the application aspects of the subject.

There are no comments on this title.

to post a comment.

Circulation Timings: Monday to Saturday: 8:30 AM to 9:30 PM | Sundays/Bank Holiday during Examination Period: 10:00 AM to 6:00 PM