Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography and Network Security Prakash C. Gupta

By: Material type: TextTextLanguage: English Publication details: New Delhi : PHI Learning, 2015.Description: xx, 456 p.: ill.; 24 cmISBN:
  • 9788120350458
Subject(s): DDC classification:
  • 005.82 GUP
Contents:
Introduction to Network Security Mathematical Foundations I (Modular Arithmetic) Classical Encryption Techniques Symmetric-key Ciphers I: Data Encryption Standard Mathematical Foundations II (Finite Fields) Symmetric-key Ciphers II: Advanced Encryption Standard Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers) Mathematical Foundations III (Prime Numbers) Asymmetric-key Cryptosystems Elliptic Curve Cryptography Message Authentication Digital Signatures Entity Authentication Symmetric-key Distribution Public-key Distribution Email Security Transport Layer Security (TLS) IP Security Internet Key Exchange (IKE) Wireless LAN Security Network Vulnerabilities Firewalls and Intrusion Detection Systems Malware
Summary: The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security. Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 GUP (Browse shelf(Opens below)) Available 34064
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 GUP (Browse shelf(Opens below)) Available 34065
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 GUP (Browse shelf(Opens below)) Available 34066
General Books General Books CUTN Central Library Generalia Non-fiction 005.82 GUP (Browse shelf(Opens below)) Available 34067
Reference Books Reference Books CUTN Central Library Generalia Reference 005.82 GUP (Browse shelf(Opens below)) Not For Loan 34068

Introduction to Network Security

Mathematical Foundations I (Modular Arithmetic)



Classical Encryption Techniques



Symmetric-key Ciphers I: Data Encryption Standard




Mathematical Foundations II (Finite Fields)





Symmetric-key Ciphers II: Advanced Encryption Standard






Symmetric-key Ciphers III (Modes of Operation, Stream Ciphers)






Mathematical Foundations III (Prime Numbers)






Asymmetric-key Cryptosystems





Elliptic Curve Cryptography







Message Authentication







Digital Signatures







Entity Authentication







Symmetric-key Distribution








Public-key Distribution








Email Security









Transport Layer Security (TLS)










IP Security











Internet Key Exchange (IKE)












Wireless LAN Security











Network Vulnerabilities













Firewalls and Intrusion Detection Systems














Malware














The book is intended for the undergraduate and postgraduate students of computer science and engineering and information technology, and the students of master of computer applications. The purpose of this book is to introduce this subject as a comprehensive text which is self contained and covers all the aspects of network security.

Each chapter is divided into sections and subsections to facilitate design of the curriculum as per the academic needs. The text contains numerous examples and illustrations that enhance conceptual clarity. Each chapter has set of problems at the end of chapter that inspire the reader to test his understanding of the subject. Answers to most of the problems are given at the end of the book.

There are no comments on this title.

to post a comment.

Powered by Koha