Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Network security and cryptography / Umesh Sehgal and Kuljeet Kaur.

By: Contributor(s): Material type: TextTextPublisher: New Delhi, India : S.K. Kataria & Sons, 2009 ; Reprint 2022Edition: First editionDescription: 342 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9789350146637
Subject(s): DDC classification:
  • 005.8 Se41n 23
LOC classification:
  • TK5105.59 .S444 2009
Contents:
Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols.
Summary: "This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Circulation Section CIR 005.8 Se41n 2009 (Browse shelf(Opens below)) 1-1 Available 031400

Includes index.

Unit-I: Introduction to cryptography -- Network security -- Cryptosystem -- Mobility in network -- Network security issues -- Unit-II: Crypto analysis -- Introduction to crypto -- Crypto analysis -- Unit-III: Message authentication and hash function -- Information system -- Security user -- Public key cryptography -- Unit-IV: Authentication algorithm application -- Digital signature algorithm -- Authentication key protocol -- Signature schemes -- Unit-V: Web and system security -- Web security -- System security -- Topology -- Protocol suite -- Trust models -- Firewalls -- Firewalls attacks -- Unit-VI: Security and theorem -- Theorem and algorithm -- Socket layer -- Network layer security -- Session layer -- Security at the application layer -- Entity authentication -- Symmetric key ciphers -- Mathematics of cryptography -- Data encryption standard -- Modern ciphers -- Using algorithms -- Public key algorithm -- Special algorithm for protocols.

"This book covers the encryption techniques, Public key Cryptosystem, concern authentication and Hash function. Also define the application of web system security and advanced standard and algorithms. Written as a text book for undergraduate, Post Graduate courses in Electronics and communications, Computer science, this book presents the subject systematically following the layered architecture approach .It will also be useful for the computer and communications professionals who wish to explore the field of network security but are not familiar with the terminology and the architecture. This book is intended for both a professional and an academic audience. For the professional interested in this field, the book serves as a basic reference volume and is suitable for self study. The book is laid out to present material in a top down fashion. This has the advantage of immediately focusing on the most visible part of the material, the applications, and then seeing, progressively, how each Algo is supported by the next Algo down. This approach makes the most sense for many instructors and students. The application layer is most visible layer to the student and typically provides the most interest. An understanding of the applications motivates the mechanisms found at the Encryption Techniques"-- Preface of the book.

There are no comments on this title.

to post a comment.