×







We sell 100% Genuine & New Books only!

Cryptography And Security Edition 2011 at Meripustak

Cryptography And Security Edition 2011 by C K SHYAMALA, N HARINI, DR T R, WILEY INDIA

Books from same Author: C K SHYAMALA, N HARINI, DR T R

Books from same Publisher: WILEY INDIA

Related Category: Author List / Publisher List


  • Price: ₹ 849.00/- [ 5.00% off ]

    Seller Price: ₹ 807.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)C K SHYAMALA, N HARINI, DR T R
    PublisherWILEY INDIA
    ISBN9788126522859
    Pages560
    BindingSoftbound
    Publish YearJanuary 2011

    Description

    WILEY INDIA Cryptography And Security Edition 2011 by C K SHYAMALA, N HARINI, DR T R

    In this book, basic concepts of cryptography and security are introduced. Cryptography and security are dealt with in sufficient depth and detail without losing focus. Symmetric and asymmetric key cryptography Elliptic curve cryptography, hashing functions, message authentication and digital signature are discussed and salient features in each explained. Subsequently the cryptographic concepts are used to address security issues at application, transport and network layers. Security threats at various levels and counter measures are explained. Relevant standards and applications are given sufficient attention.Part A - Cryptography· Chapter 1. Number Theory and Algebra· Chapter 2. Classical Cryptography· Chapter 3. Foundations of Modern Cryptography· Chapter 4. Private-Key Cryptography· Chapter 5. Public-Key Cryptography· Chapter 6. Stream Ciphers· Chapter 7. Hashing, Authentication and Signature SchemesPart B - Network Security· Chapter 8. Authentication· Chapter 9. E-mail Security· Chapter 10. Internet Protocol Security (IPSec)· Chapter 11. Web SecurityPart C - System Security· Chapter 12. Intruders· Chapter 13. Viruses and Worms· Chapter 14. Firewall· Chapter 15. Trusted Systems Appendix A Security ImplementationAppendix B Wireless Network SecurityAppendix C SDLCAppendix D DomainKeys Identified Mail (DKIM)Appendix E ACM Code of Ethics and Professional ConductReferencesIndex



    Book Successfully Added To Your Cart