

V.K. Pachghare, Ph.D., is Associate Professor in the Department of Computer Engineering and Information Technology, College of Engineering, Pune (An autonomous institute of Government of Maharashtra).
Meer over V. PachghareCryptography and Information Security
Paperback Engels 2015 2e druk 9788120350823Samenvatting
This thoroughly revised and well-organised book is in its second edition, continues to present the principles, techniques, design and implementation of cryptography and information security algorithms, with a perfect balance in the presentation of theoretical and practical aspects. To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat’s theorem and Euler’s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also discussed.
This edition includes the topics with new innovations and improvements in the field of cryptography and information security in a substantial and comprehensive way. In this edition, the effort is taken to improve the pedagogy and user friendliness. It incorporates many solved numerical problems to clarify the various concepts and different algorithms and also includes MCQs with their answers in each chapter.
The book is intended for the undergraduate and postgraduate students of computer science and engineering (B.Tech./M.Tech.), undergraduate and postgraduate students of computer science (B.Sc./M.Sc. Computer Science), and information technology (B.Sc./M.Sc. IT) and the students of Master of Computer Applications (MCA).
KEY FEATURES
- Covers the latest topic of computer forensics and the areas in which they can be applied.
- Gives algorithms with numerical explanations.
- Provides a large number of solved problems.
Specificaties
Lezersrecensies
Inhoudsopgave
Acknowledgements
1. Introduction
2. Data Encryption Techniques
3. Data Encryption Standards
4. Advanced Encryption Standard
5. Symmetric Ciphers
6. Number Theory
7. Public Key Cryptosystems
8. Key Management
9. Authentication
10. Digital Signatures
11. Electronic Mail Security
12. IP Security
13. Web Security
14. Intrusion
15. Malicious Software
16. Firewall
17. Computer Forensics
Index
Anderen die dit boek kochten, kochten ook
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan