Cryptography, network security, and cyber laws /
Menezes, Bernard L.
Cryptography, network security, and cyber laws / by Bernard L. Menezes; Ravinder Kumar - Delhi, Cengage Learning India Pvt. Ltd. : 2018. - xix, 488p. : ill.; 24 cm.
Includes index.
Includes bibliographies and index.
Contents -- 1. Introduction -- 2. Computer Networking Primer -- 3. Mathematical Background for Cryptography -- 4. Basics of Cryptography -- 5. Secret Key Cryptography -- 5. Public Key Cryptography and RSA -- 7. Cryptographic Hash -- 8.Discrete Logarithm and its Applications -- 9. Elliptic Curve Cryptography and Advanced Encryption Standard -- 10. Key Management -- 11. Authentication-I -- 12. Authentication-II -- 13. IPSec-
Security at the Network Layer --14. Security at the Transport Layer -- 15. IEEE 802.11 Wireless LAN Security -- 17. Non-Cryptographic Protocol Vulnerabilities -- 18. Software Vulnerabilities -- 19. Viruses, Worms, and Other Malware -- 20. Access Control in the Operating System --21. Firewalls -- 22. Intrusion Prevention and Detection -- 23. RFIDs and E-Passports -- 24. Electronic Payment -- 25. Web Services Security -- 26. Internet Law and Cyber Crimes -- 27. The Information Technology Act, 2000
9789386858948
Computer science
Network security Cryptography Electronic payment
005.82 / MEN R
Cryptography, network security, and cyber laws / by Bernard L. Menezes; Ravinder Kumar - Delhi, Cengage Learning India Pvt. Ltd. : 2018. - xix, 488p. : ill.; 24 cm.
Includes index.
Includes bibliographies and index.
Contents -- 1. Introduction -- 2. Computer Networking Primer -- 3. Mathematical Background for Cryptography -- 4. Basics of Cryptography -- 5. Secret Key Cryptography -- 5. Public Key Cryptography and RSA -- 7. Cryptographic Hash -- 8.Discrete Logarithm and its Applications -- 9. Elliptic Curve Cryptography and Advanced Encryption Standard -- 10. Key Management -- 11. Authentication-I -- 12. Authentication-II -- 13. IPSec-
Security at the Network Layer --14. Security at the Transport Layer -- 15. IEEE 802.11 Wireless LAN Security -- 17. Non-Cryptographic Protocol Vulnerabilities -- 18. Software Vulnerabilities -- 19. Viruses, Worms, and Other Malware -- 20. Access Control in the Operating System --21. Firewalls -- 22. Intrusion Prevention and Detection -- 23. RFIDs and E-Passports -- 24. Electronic Payment -- 25. Web Services Security -- 26. Internet Law and Cyber Crimes -- 27. The Information Technology Act, 2000
9789386858948
Computer science
Network security Cryptography Electronic payment
005.82 / MEN R