DELNET     HELINET         N-LIST        ACHARYA PUBLICATIONS        REMOTE ACCESS
Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from Coce

Cryptography, network security, and cyber laws / by Bernard L. Menezes; Ravinder Kumar

By: Material type: TextTextPublication details: Delhi, Cengage Learning India Pvt. Ltd. : 2018.Description: xix, 488p. : ill.; 24 cmISBN:
  • 9789386858948
Subject(s): DDC classification:
  • 005.82 23rd ed. MEN R
Contents:
Contents -- 1. Introduction -- 2. Computer Networking Primer -- 3. Mathematical Background for Cryptography -- 4. Basics of Cryptography -- 5. Secret Key Cryptography -- 5. Public Key Cryptography and RSA -- 7. Cryptographic Hash -- 8.Discrete Logarithm and its Applications -- 9. Elliptic Curve Cryptography and Advanced Encryption Standard -- 10. Key Management -- 11. Authentication-I -- 12. Authentication-II -- 13. IPSec- Security at the Network Layer --14. Security at the Transport Layer -- 15. IEEE 802.11 Wireless LAN Security -- 17. Non-Cryptographic Protocol Vulnerabilities -- 18. Software Vulnerabilities -- 19. Viruses, Worms, and Other Malware -- 20. Access Control in the Operating System --21. Firewalls -- 22. Intrusion Prevention and Detection -- 23. RFIDs and E-Passports -- 24. Electronic Payment -- 25. Web Services Security -- 26. Internet Law and Cyber Crimes -- 27. The Information Technology Act, 2000
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Status Date due Barcode
AIT-MCA Donated Books AIT-MCA Donated Books Acharya Institute of Technology Acharya Institute of Technology 005.82MEN R (Browse shelf(Opens below)) Not for loan AIT-MCDB99

Includes index.

Includes bibliographies and index.

Contents -- 1. Introduction -- 2. Computer Networking Primer -- 3. Mathematical Background for Cryptography -- 4. Basics of Cryptography -- 5. Secret Key Cryptography -- 5. Public Key Cryptography and RSA -- 7. Cryptographic Hash -- 8.Discrete Logarithm and its Applications -- 9. Elliptic Curve Cryptography and Advanced Encryption Standard -- 10. Key Management -- 11. Authentication-I -- 12. Authentication-II -- 13. IPSec-
Security at the Network Layer --14. Security at the Transport Layer -- 15. IEEE 802.11 Wireless LAN Security -- 17. Non-Cryptographic Protocol Vulnerabilities -- 18. Software Vulnerabilities -- 19. Viruses, Worms, and Other Malware -- 20. Access Control in the Operating System --21. Firewalls -- 22. Intrusion Prevention and Detection -- 23. RFIDs and E-Passports -- 24. Electronic Payment -- 25. Web Services Security -- 26. Internet Law and Cyber Crimes -- 27. The Information Technology Act, 2000

There are no comments on this title.

to post a comment.
Copyrights © 2022 Acharya. All rights reserved

Powered by Koha