Cryptography And Network Security

4th Edition
9353163315 · 9789353163310
OVERVIEWThe previous avatars of this book have been used and recommended by thousands of students, teachers and IT professionals. Aiming to serve the same audience, the author has updated this book as per current technological demands. It is meant to… Read More
Lifetime
S$45.78
After you purchase your eBook, you will need to download VitalSource Bookshelf, a free app. Then login or create an account and enter the code from your order confirmation email to access your eBook.
  • Access the eBook anytime, anywhere: online or offline
  • Create notes, flashcards and make annotations while you study
  • Full searchable content: quickly find the answers you are looking for
Preface to the fourth edition
Preface to the first edition
Important terms and Abbreviations


1. Introduction to the concepts of Security
2. Cryptography techniques
3. Computer- based Symmetric Key Cryptographic Algorithms
4. Computer- based Asymmetric Key Cryptography Algorithms
5. Public Key Infrastructure (PKI)
6. Internet- Security Protocols
7. User- Authentication Mechanisms
8. Practical Implementations of Cryptography/ Security
9. Network Security


Appendices
• Mathematical background
• Number systems
• Information theory
• Real – life tools
• Web resources
• A brief introduction to ASN, BER, DER


References
Index


OVERVIEW


The previous avatars of this book have been used and recommended by thousands of students, teachers and IT professionals. Aiming to serve the same audience, the author has updated this book as per current technological demands. It is meant to explain the key concepts in cryptography to anyone who has a basic understanding in computer science and networking concepts. This fourth edition is a comprehensive introduction to computer security/ cryptography.
Lucid and crisp presentation backed with bottom up approach make the book perspicuous to even a first- time reader and increases interest in the application aspects of the subject.




KEY FEATURES


• Highly illustrative with step-by-step explanations
• Comprehensive coverage of topics like Cryptography, Algorithms, Network security, Online security, Authentication mechanisms
• Inclusion of new topics like SHA-512, Biometrics and AES
• Incorporates topics for professionals such as Firewalls, VPNs, Digital signatures etc.
• Includes practical and real-life cases, such as online payment mechanisms, how proxy servers work using NAT, how are Websites verified online etc.