Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptography and network security = demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cryptography and network security / Bhushan Trivedi, , Savita Gandhi, Dhiren Pandit.
Reminder of title:
demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /
Author:
Trivedi, Bhushan.
other author:
Pandit, Dhiren,
Description:
1 online resource (717 pages)
Subject:
COMPUTERS / Security / Cryptography & Encryption. -
Online resource:
https://portal.igpublish.com/iglibrary/search/BPB0000746.html
ISBN:
9789389328660
Cryptography and network security = demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /
Trivedi, Bhushan.
Cryptography and network security
demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /[electronic resource] :Bhushan Trivedi, , Savita Gandhi, Dhiren Pandit. - 1 online resource (717 pages)
Includes bibliographical references and index.
Cryptography and network security : demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security -- About the Authors -- Acknowledgments -- Preface -- Table of Contents -- Chapter 1. An Overview of Network and Information Security -- Chapter 2. Introduction to Cryptography -- Chapter 3. Block Ciphers and Attacks -- Chapter 4. Number Theory Fundamentals -- Chapter 5. Algebraic Structures -- Chapter 6. Stream Ciphers and Cipher Modes -- Chapter 7. Secure Hash Functions -- Chapter 8. Message Authentication using MAC -- Chapter 9. Authentication and Message Integrity Using Digital Signatures -- Chapter 10. Advanced Encryption Standard -- Chapter 11. Pseudo-Random Numbers -- Chapter 12. Public Key Algorithms and RSA -- Chapter 13. Other Public Key Algorithms -- Chapter 14. Key Management and Exchange -- Chapter 15. User Authentication Using Kerberos -- Chapter 16. User Authentication Using Public Key Certificates -- Chapter 17. Email Security: PGP and SMIME -- Chapter 18. Transport Layer Security (TLS) and SSL -- Chapter 19. IP Security (IPsec) -- Chapter 20. Wireless Security -- Index.
Access restricted to authorized users and institutions.
Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail. WHAT YOU WILL LEARN Describe and show real-world connections of cryptography and applications of cryptography and secure hash functions. How one can deploy User Authentication, Digital Signatures, and AES Encryption process. How the real-world protocols operate in practice and their theoretical implications. Describe different types of ciphers, exploit their modes for solving problems, and finding their implementation issues in system security. Explore transport layer security, IP security, and wireless security. WHO THIS BOOK IS FOR This book is for security professionals, network engineers, IT managers, students, and teachers who are interested in learning Cryptography and Network Security.
Mode of access: World Wide Web.
ISBN: 9789389328660Subjects--Topical Terms:
1483837
COMPUTERS / Security / Cryptography & Encryption.
Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: QA76.9.C94
Dewey Class. No.: 005.82
Cryptography and network security = demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /
LDR
:04051nam a2200289 i 4500
001
1157358
006
m eo d
007
cr cn |||m|||a
008
250717s2021 ob 000 0 eng d
020
$a
9789389328660
020
$a
9789389328677
035
$a
BPB0000746
041
0 #
$a
eng
050
0 0
$a
QA76.9.C94
082
0 0
$a
005.82
100
1
$a
Trivedi, Bhushan.
$3
1141521
245
1 0
$a
Cryptography and network security
$b
demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security /
$c
Bhushan Trivedi, , Savita Gandhi, Dhiren Pandit.
$h
[electronic resource] :
264
1
$a
[Place of publication not identified] :
$b
BPB Publications,
$c
2021.
264
4
$c
©2022
300
$a
1 online resource (717 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
504
$a
Includes bibliographical references and index.
505
0 #
$a
Cryptography and network security : demystifying the ideas of network security, cryptographic algorithms, wireless security, IP security, system security, and email security -- About the Authors -- Acknowledgments -- Preface -- Table of Contents -- Chapter 1. An Overview of Network and Information Security -- Chapter 2. Introduction to Cryptography -- Chapter 3. Block Ciphers and Attacks -- Chapter 4. Number Theory Fundamentals -- Chapter 5. Algebraic Structures -- Chapter 6. Stream Ciphers and Cipher Modes -- Chapter 7. Secure Hash Functions -- Chapter 8. Message Authentication using MAC -- Chapter 9. Authentication and Message Integrity Using Digital Signatures -- Chapter 10. Advanced Encryption Standard -- Chapter 11. Pseudo-Random Numbers -- Chapter 12. Public Key Algorithms and RSA -- Chapter 13. Other Public Key Algorithms -- Chapter 14. Key Management and Exchange -- Chapter 15. User Authentication Using Kerberos -- Chapter 16. User Authentication Using Public Key Certificates -- Chapter 17. Email Security: PGP and SMIME -- Chapter 18. Transport Layer Security (TLS) and SSL -- Chapter 19. IP Security (IPsec) -- Chapter 20. Wireless Security -- Index.
506
#
$a
Access restricted to authorized users and institutions.
520
3
$a
Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail. WHAT YOU WILL LEARN Describe and show real-world connections of cryptography and applications of cryptography and secure hash functions. How one can deploy User Authentication, Digital Signatures, and AES Encryption process. How the real-world protocols operate in practice and their theoretical implications. Describe different types of ciphers, exploit their modes for solving problems, and finding their implementation issues in system security. Explore transport layer security, IP security, and wireless security. WHO THIS BOOK IS FOR This book is for security professionals, network engineers, IT managers, students, and teachers who are interested in learning Cryptography and Network Security.
538
$a
Mode of access: World Wide Web.
650
# 7
$a
COMPUTERS / Security / Cryptography & Encryption.
$2
bisacsh
$3
1483837
650
# 7
$a
COMPUTERS / Security / Network Security.
$2
bisacsh
$3
1483836
655
# 4
$a
Electronic books.
$2
local
$3
554714
700
1 #
$a
Pandit, Dhiren,
$e
author
$3
1483982
700
1 #
$a
Gandhi,, Savita,
$e
author
$3
1483981
856
4 0
$u
https://portal.igpublish.com/iglibrary/search/BPB0000746.html
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login
Please sign in
User name
Password
Remember me on this computer
Cancel
Forgot your password?