Download App
ISBN
:
9780070648234
Publisher
:
Tata Mcgraw Hill Education Private Limited
Binding
:
Paperback
Pages
:
541
Year
:
2007
₹
410.0
₹
323.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Key Features Uses a bottom-up approach, where introductory topics are followed by topics on Cryptography, Network Security and then Case Studies. Updated coverage of Symmetric Key & Asymetric Key Cryptographic Algorithms, including expanded section on AES, Blowfish, & Digital Certificates. Stress on Case Studies and Practical Implementations of Cryptography. Pedagogical Features: 140 Multiple Choice Questions 135 Exercises 125 Design/Programming Exercises 600 figures New to the Edition: Content on AES, PGP, S/MIME and Blowfish has been expanded. New topics like Birthday Attacks, Trusted Systems, OSI Architecture, Buffer Overflow, and Legal/Ethical Issues added. Chapter on Practical Implementations of Cryptography has been updated by adding .NET Cryptography, TCP/IP Vulnerabilities, and security in OS. Chapter on Network Security has been updated by adding material on NAT (Network Added Translation), Audit Records, and Honeypots. 138 new exercises have been added to the already existing pool of exercises. Chapter on Public Key Infrastructure has been expanded by adding sections on Java and Digital Certificates. Every chapter has undergone extensive revision, whereby a perfect balance has been maintained between mathematics and theory. Rich pedagogy in terms of Exercises and Design/Programming Problems. Good supporting material available on the web site About The Author Atul Kahate is working with Oracle Financial sevice software limited as Head-Technology Practice for about 8 years now. He has done his bachelor of science degree in statistics and master of business administration in Computer systems. He has authored 20 highly acclaimed books on various areas of information Technology, titled WEB TECHNOLOGIES-TCP/IP to internet Application Architectures, Cryptography and Network Security, Fundamentals of Computers and Foundations of Information Technology, to name a few Table Of Contents Chapter 1: Attacks on Computers and Computer Security Chapter 2: Cryptography: Concepts and Techniques Chapter 3: Symmetric Key Algorithms and AES Chapter 4: Asymmetric Key Algorithms, Digital Signatures, and RSA Chapter 5: Digital Certificates and Public Key Infrastructure (PKI) Chapter 6: Internet Security Protocols Chapter 7: User Authentication and Kerberos Chapter 8: Cryptography in Java, .NET and Operating Systems Chapter 9: Network Security, Firewalls, and Virtual Private Networks (VPN) Chapter 10: Case Studies on Cryptography and Security
Related Items
-
of
Web Technologies: TCP/IP, Architecture
Godbole Achyut Kahate Atul
Starts At
400.0
450.0
11% OFF
World Development Report: Conflict, Security, And Development
World Bank Group
Starts At
1244.0
1638.0
24% OFF
Applied Cryptography: Protocols, Algorithms And, Source Code In C
Bruice Schneier
Starts At
613.0
829.0
26% OFF
Information Systems Security: Security Management, Metrics, Frameworks And Best Practices
Nina Godbole
Starts At
696.0
849.0
18% OFF
Computer Networks: Principles,Technologies And Protocols For Network Design
Natalia Olifer
Starts At
761.0
929.0
18% OFF
Storage Area Network Essentials: A Complete Guide To Understanding And Implementating Sans
Paul Massiglia Richard Barker
Starts At
497.0
599.0
17% OFF
An Engineering Approach to Computer Networking : ATM Networks, the Internet, and the Telephone Network
S. Keshav
Starts At
786.0
959.0
18% OFF
Network Management : Concepts and Practice A Hands-On Approach (With CD)
J. Richard Burke
Starts At
827.0
1009.0
18% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 1 Item
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary