Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography, Network Security, and Cyber Laws / Bernard L. Menezes and Ravinder Kumar

By: Contributor(s): Material type: TextTextPublication details: New Delhi Cengage Learning India Pvt. Ltd. 2018Description: xix, 488p. : ill. ; 24cmISBN:
  • 9789386858948
Subject(s): DDC classification:
  • 23rd 005.82 MEN
Online resources:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode
Text Book VIT-AP General Stacks 005.82 MEN (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-11-28 CSE 021988
Reference Book VIT-AP General Stacks Reference 005.82 MEN (Browse shelf(Opens below)) Not For Loan (Restricted Access) CSE 020003
Text Book VIT-AP General Stacks 005.82 MEN (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-09-24 CSE 020004
Text Book VIT-AP General Stacks 005.82 MEN (Browse shelf(Opens below)) In transit from VIT-AP to School of Computer Science Section since 2024-10-04 CSE 020005

It includes Bibliography and Index pages.

Overview:



Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.

Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.

Features:


Written in a lucid and easy-to-understand language.
Comprehensively covers all the key areas of network security.
Provides a mix of fundamental concepts together with practical aspects of security.
Each chapter is interspersed with a large number of figures, tables, and examples that complement the text.
Sufficient number of objective-type questions and exercises that enable students to gauge the depth of their understanding of the subject material.

Table of Contents:

1. Introduction

2. Computer Networking Primer

3. Mathematical Background for Cryptography

4. Basics of Cryptography

5. Secret Key Cryptography

6. Public Key Cryptography and RSA

7. Cryptographic Hash

8. Discrete Logarithm and its Applications

9. Elliptic Curve Cryptography and Advanced Encryption Standard

10. Key Management

11. Authentication–I

12. Authentication–II

13. IPSec—Security at the Network Layer

14. Security at the Transport Layer

15. IEEE 802.11 Wireless LAN Security

16. Cellphone Security

17. Non-Cryptographic Protocol Vulnerabilities

18. Software Vulnerabilities

19. Viruses, Worms, and Other Malware

20. Access Control in the Operating System

21. Firewalls

22. Intrusion Prevention and Detection

23. RFIDs and E-Passports

24. Electronic Payment

25. Web Services Security

26. Internet Law and Cyber Crimes

27. The Information Technology Act, 2000

There are no comments on this title.

to post a comment.

Visitor Number:

Powered by Koha