Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography and Network Security, 2/e (SIE) [electronic resource] /

By: Material type: Computer fileComputer fileEdition: 2Description: 765 pISBN:
  • 9780070702080
Online resources: Summary: Overview: The new edition treats the subject in a lucid manner explaining tough concepts through simple schematic diagrams and easy to understand language. A new chapter on System Security has been included to help understand the attacks by various intruders & malicious softwares on the computer systems and the protective & security measures adopted against them using Firewalls, Intrusion detection systems. Numerous solved examples, algorithms, illustrations & usage of fictitious characters makes the text interesting and simple to read & comprehend. Features:  Inclusion of a new chapter on Systems Security  Addition of important topics such as types of conventional algorithms, Secure Electronic Transaction (SET), etc.  Thorough treatment for topics related to Symmetric Ciphers, AES; Digital Signatures, Hash Functions.  Pseudocodes used to illustrate the algorithm implementation.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Overview: The new edition treats the subject in a lucid manner explaining tough concepts through simple schematic diagrams and easy to understand language. A new chapter on System Security has been included to help understand the attacks by various intruders & malicious softwares on the computer systems and the protective & security measures adopted against them using Firewalls, Intrusion detection systems. Numerous solved examples, algorithms, illustrations & usage of fictitious characters makes the text interesting and simple to read & comprehend. Features:  Inclusion of a new chapter on Systems Security  Addition of important topics such as types of conventional algorithms, Secure Electronic Transaction (SET), etc.  Thorough treatment for topics related to Symmetric Ciphers, AES; Digital Signatures, Hash Functions.  Pseudocodes used to illustrate the algorithm implementation.

There are no comments on this title.

to post a comment.