Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

CRYPTOGRAPHY AND NETWORK SECURITY [electronic resource] /

By: Material type: Computer fileComputer fileDescription: 792 pISBN:
  • 9780071336802
Online resources: Summary: Security being one of the main concerns of any organization, this title clearly explains the concepts behind Cryptography and the principles employed behind Network Security. The text steers clear of complex mathematical treatment and presents the concepts involved through easy-to-follow examples and schematic diagrams. This text can very well serve as a main text for students pursuing CSE or IT streams. Key features Uses a bottom-up approach, where introductory topics are followed by topics on Cryptography, Network Security and then Case Studies. Updated coverage of Symmetric Key & Asymetric Key Cryptographic Algorithms, including expanded section on AES, Blowfish, & Digital Certificates. Stress on Case Studies and Practical Implementations of Cryptography. Pedagogical Features: 140 Multiple Choice Questions 135 Exercises 125 Design/Programming Exercises 600 figures New to the Edition: Content on AES, PGP, S/MIME and Blowfish has been expanded. New topics like Birthday Attacks, Trusted Systems, OSI Architecture, Buffer Overflow, and Legal/Ethical Issues added. Chapter on Practical Implementations of Cryptography has been updated by adding .NET Cryptography, TCP/IP Vulnerabilities, and security in OS. Chapter on Network Security has been updated by adding material on NAT (Network Added Translation), Audit Records, and Honeypots. 138 new exercises have been added to the already existing pool of exercises. Chapter on Public Key Infrastructure has been expanded by adding sections on Java and Digital Certificates. Every chapter has undergone extensive revision, whereby a perfect balance has been maintained between mathematics and theory. Rich pedagogy in terms of Exercises and Design/Programming Problems. Good supporting material available on the web site.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Security being one of the main concerns of any organization, this title clearly explains the concepts behind Cryptography and the principles employed behind Network Security. The text steers clear of complex mathematical treatment and presents the concepts involved through easy-to-follow examples and schematic diagrams. This text can very well serve as a main text for students pursuing CSE or IT streams. Key features Uses a bottom-up approach, where introductory topics are followed by topics on Cryptography, Network Security and then Case Studies. Updated coverage of Symmetric Key & Asymetric Key Cryptographic Algorithms, including expanded section on AES, Blowfish, & Digital Certificates. Stress on Case Studies and Practical Implementations of Cryptography. Pedagogical Features: 140 Multiple Choice Questions 135 Exercises 125 Design/Programming Exercises 600 figures New to the Edition: Content on AES, PGP, S/MIME and Blowfish has been expanded. New topics like Birthday Attacks, Trusted Systems, OSI Architecture, Buffer Overflow, and Legal/Ethical Issues added. Chapter on Practical Implementations of Cryptography has been updated by adding .NET Cryptography, TCP/IP Vulnerabilities, and security in OS. Chapter on Network Security has been updated by adding material on NAT (Network Added Translation), Audit Records, and Honeypots. 138 new exercises have been added to the already existing pool of exercises. Chapter on Public Key Infrastructure has been expanded by adding sections on Java and Digital Certificates. Every chapter has undergone extensive revision, whereby a perfect balance has been maintained between mathematics and theory. Rich pedagogy in terms of Exercises and Design/Programming Problems. Good supporting material available on the web site.

There are no comments on this title.

to post a comment.