Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography and Information Security V. K. Pachghare

By: Material type: TextTextLanguage: English Publication details: New Delhi : PHI Learning, 2017.Edition: 2ne edDescription: xix, 393 p.: ill.; 24 cmISBN:
  • 9788120350823
Subject(s): DDC classification:
  • 005.82 PAC
Contents:
Data Encryption Techniques Data Encryption Standards Advanced Encryption Standard Symmetric Ciphers Number Theory Public Key Cryptosystems Key Management Authentication Digital Signatures Electronic Mail Security IP Security Web Security Intrusion Malicious Software Firewall Computer Forensics
Summary: This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed. This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter. The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 PAC (Browse shelf(Opens below)) Available 34074
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 PAC (Browse shelf(Opens below)) Available 34075
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 PAC (Browse shelf(Opens below)) Available 34076
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 PAC (Browse shelf(Opens below)) Available 34077
Reference Books Reference Books CUTN Central Library Generalia Reference 005.82 PAC (Browse shelf(Opens below)) Not For Loan 34078

Data Encryption Techniques
Data Encryption Standards

Advanced Encryption Standard

Symmetric Ciphers

Number Theory


Public Key Cryptosystems



Key Management



Authentication



Digital Signatures



Electronic Mail Security




IP Security



Web Security




Intrusion





Malicious Software






Firewall







Computer Forensics







This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed.

This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter.

The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).

There are no comments on this title.

to post a comment.

Powered by Koha