Network security and cryptography / Umesh Sehgal and Kuljeet Kaur.
Material type:
TextPublisher: New Delhi, India : S.K. Kataria & Sons, 2009 ; Reprint 2022Edition: First editionDescription: 342 pages : illustrations ; 24 cmContent type: - text
- unmediated
- volume
- 9789350146637
- 005.8 Se41n 23
- TK5105.59 .S444 2009
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 005.8 Se41n 2009 (Browse shelf(Opens below)) | 1-1 | Available | 031400 |
Includes index.
Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols.
"This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book.
There are no comments on this title.