Cryptography and Network Security - A Practical Approach By K.Haribaskar

Cryptography and Network Security - A Practical Approach By K.Haribaskar

( 51 )
Sold ( 58 times )
11318 Views
Price : ₹225.00
Inclusive of all taxes
INSTANT delivery: Read it now on your device

Buy Ebook₹225.00 Rental Ebook Up to 70% Off

Save extra with 2 Offers

Get ₹ 50

Instant Cashback on the purchase of ₹ 400 or above
SAVE05 Already Applied

Product Specifications

Publisher Laxmi Publications All Computer Science books by Laxmi Publications
ISBN 9789381159637
Author: K.Haribaskar
Number of Pages 249
Edition First Edition
Available
Available in all digital devices
  • Snapshot
  • About the book
  • Sample book
Cryptography and Network Security - A Practical Approach By K.Haribaskar - Page 1 Cryptography and Network Security - A Practical Approach By K.Haribaskar - Page 2 Cryptography and Network Security - A Practical Approach By K.Haribaskar - Page 3 Cryptography and Network Security - A Practical Approach By K.Haribaskar - Page 4 Cryptography and Network Security - A Practical Approach By K.Haribaskar - Page 5

Cryptography And Network Security - A Practical Approach By K.Haribaskar
Book Summary:

This book has provided a state of the art text that covers basic issues and principles, as well as surveys cryptographic and network security techniques. The latter part of the book deals with the real-world practice of network security: practical applications that have been implemented and are in use to provide network security. This book would be highly valuable for students and professionals in this field. Besides Anna University and Andhra University, the book covers the syllabus of University of Calicut, Shivaji University and Uttar Pradesh Technical University.

Audience of the Book :
This book Useful for Engineering, Computer Science, Higher Education.
Key Features:
  • A comprehensive update of conventional encryption
  • To understand the concepts of public key encryption
  • New examples in network security tools and applications
  • Expanded view of Elliptic-Curve Cryptography: In depth treatment reflects its wide spread use and importance. 
Table of Contents:

PART 1: SYMMETRIC CIPHERS

1. INTRODUCTION TO NETWORKING

2. CLASSICAL ENCRYPTION TECHNIQUES

3. BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD

4. ADVANCED ENCRYPTION STANDARD

PART 2: ASYMMETRIC CIPHERS

5. NUMBER THEORY

6. PUBLIC-KEY, CRYPTOGRAPHY AND RSA

7. OTHER PUBLIC KEY CRYPTOSYSTEMS

PART 3: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

8. CRYPTOGRAPHIC HASH FUNCTIONS

PART 4: MUTUAL TRUST

9. KEY MANAGEMENT AND DISTRIBUTION

PART 5: NETWORK AND INTERNET SECURITY

10. SYSTEM LEVEL SECURITY

APPENDICES

Appendix 1         The Importance of Standards

Appendix 2         Standards and Regulations

Appendix 3         Internet Standards and the Internet Society

Appendix 4         National Institute of Standards and Technology's

Appendix 5         Standards and Specifications Cited in this Book

Annexure I         Annexure of Chapter 1

Annexure II        Annexure of Chapter 4

Glossary

Index