About the Book: Salient Features of the Book: Multiple choice questions based on in depth knowledge of discussed various methods used in network security out the end of every chapter. Detailed coverage of Codes and Encipherment Techniques, Symmetric keyand Asymmetric key cryptography, Substitution Cipher, Monoalphabetic and polyalphabetic Ciphering. Detail discussion about Goals of Network security, types of attacks on network security and security mechanism. Provides sufficient number of examples in every chapter. Covers the latest topic of securing the low sized memory device like smart cards. One full chapter dedicated to wireless network security. Emphasis laid on Mathematics used in cryptography and network security. Exhaustive methods of steganography including audio and video steganography. Thorough discussion about Block ciphering and stream ciphering methods including DES, Feistel structure and AES. Coverage of modern Symmetric key Encipherment Techniques such as International Data Encryption Algorithm, RC4, RC5, RC6 and Blowfish. In depth Coverage of Digital signature, Message Authentication codes and key distribution systems. Detailed discussion about Message Digest algorithm, Kerberos, and X.509 Authentication Service. Comprehensively discusses system security, SSL,TLS, IDS and Firewalls. Contents: 1. Introduction to the Security Concepts 2. Codes and Encipherment Techniques 3. Block Ciphers 4. Advanced Encryption Standard 5. Modern Symmetric Key Encipherment Techniques 6. Numbers Theory Used in Cryptography 7. Public Key Cryptography 8. Public Key Cryptosystem Used as Key Management 9. Authentication and Hash Algorithms 10. Digital Signature and Its Standard 11. Electronic Mail Security 12. Internet Security Protocols 13. IP Security and Firewall 14. System Security 15. Wireless Network Security.
Trustpilot
Hace 3 semanas
Hace 4 días