Jump to ratings and reviews
Rate this book

Cryptography and Network Security

Rate this book
Multiple choice questions based on in depth knowledge of various methods used in network security.Detailed coverage of Codes and Encipherment Techniques, Symmetric keyand Asymmetric key cryptography, Substitution Cipher, Monoalphabetic and polyalphabetic Ciphering.Detail discussion about Goals of Network security, types of attacks on network security and security mechanism.Provides sufficient number of examples in every chapter.Covers the latest topic of securing the low sized memory device like smart cards.One full chapter dedicated to wireless network security.Emphasis laid on Mathematics used in cryptography and network security.Exhaustive methods of steganography including audio and video steganography.Thorough discussion about Block ciphering and stream ciphering methods including DES, Feistel structure and AES.Coverage of modern Symmetric key Encipherment Techniques such as International Data Encryption Algorithm, RC4, RC5, RC6 and Blowfish.In depth Coverage of Digital signature, Message Authentication codes and key distribution systems.Detailed discussion about Message Digest algorithm, Kerberos, and X.509 Authentication Service.Comprehensively discusses system security, SSL,TLS, IDS and Firewalls

Paperback

2 people are currently reading
3 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (33%)
4 stars
1 (33%)
3 stars
1 (33%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.