Jump to ratings and reviews
Rate this book

Cryptography and Network Security

Rate this book
• Multiple choice questions based on in depth knowledge of various methods used in network security.

• Detailed coverage of Codes and Encipherment Techniques, Symmetric keyand Asymmetric key cryptography, Substitution Cipher, Monoalphabetic and polyalphabetic Ciphering.

• Detail discussion about Goals of Network security, types of attacks on network security and security mechanism.

• Provides sufficient number of examples in every chapter.

• Covers the latest topic of securing the low sized memory device like smart cards.

• One full chapter dedicated to wireless network security.

• Emphasis laid on Mathematics used in cryptography and network security.

• Exhaustive methods of steganography including audio and video steganography.

• Thorough discussion about Block ciphering and stream ciphering methods including DES, Feistel structure and AES.

• Coverage of modern Symmetric key Encipherment Techniques such as International Data Encryption Algorithm, RC4, RC5, RC6 and Blowfish.

• In depth Coverage of Digital signature, Message Authentication codes and key distribution systems.

• Detailed discussion about Message Digest algorithm, Kerberos, and X.509 Authentication Service.

• Comprehensively discusses system security, SSL,TLS, IDS and Firewalls

421 pages, Kindle Edition

Published July 3, 2015

2 people are currently reading
3 people want to read

About the author

Amjad M.

1 book

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (33%)
4 stars
1 (33%)
3 stars
1 (33%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.