Cryptography and Network Security After introducing the basic concept of information protection, this book divides the whole into four parts, symmetric-key encryption in Part 1, asymmetric-key encryption in Part 2, integrity, authentication and key management in Part 3, . If you study this book in detail, you can easily understand the difficult contents, and think that you can study systematically about the technologies that have been developed historically. This book is about computers, electronics, information and communication, mathematics, management, information It can be used as a teaching material for undergraduate or graduate school in the field of protection, and it can be used as a tutorial that can help a lot of professionals in information security security field.
A good introductory book on cryptography and network security related topics. This was the assigned textbook for a class that I took on Cryptography and so I may have chosen a different book if I had the choice. That said, I did learn alot from the textbook and would recommend it as a useful resource.