cryptography and information security/ by V K pachghare

By: Pachghare, V KMaterial type: TextTextPublication details: New Delhi : PHI, 2009cDescription: 367p. : ill. ; 24 cmISBN: 9788120335219 (pbk)Subject(s): Computer securityDDC classification: 005.82
Contents:
1. INTRODUCTION --- 2. DATA ENCRYPTION TECHNIQUES --- 3. DATA ENCRYPTION STANDARDS --- 4. ADVANCED ENCRYPTION STANDARDS --- 5. SYMMETRIC CIPHERS --- 6. NUMBER THEORY --- 7. PUBLIC KEY CRYPTOSYSTEMS --- 8. KEY MANAGEMENT --- 9. AUTHENTICATION --- 10. DIGITAL SIGNATURES --- 11. ELECTRONIC MAIL SECURITY --- 12. IP SECURITY --- 13. WEB SECURITY --- 14. INTRUSION --- 15. MALICIOUS SOFTWARE --- 16. FIREWALL --- 17. COMPUTER FORENSICS.
Summary: To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat s theorem and Euler s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
005.82 PAC- 2009 4069 (Browse shelf (Opens below)) Available 0004069
Total holds: 0
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
005.813 SET-P 2006 1662 Programming languages : 005.82 BOS-I 2012 4587 Information theory, coding and cryptography / 005.82 DEL-I 2006 1225 Introduction to cryptography : 005.82 PAC- 2009 4069 cryptography and information security/ 005.8/2 SCH-A 2006 3622 Applied cryptography : 005.82 SCH-P 2006 2080 Practical cryptography / 005.82 SCH-P 2006 783 Practical cryptography /

Index present

1. INTRODUCTION ---
2. DATA ENCRYPTION TECHNIQUES ---
3. DATA ENCRYPTION STANDARDS ---
4. ADVANCED ENCRYPTION STANDARDS ---
5. SYMMETRIC CIPHERS ---
6. NUMBER THEORY ---
7. PUBLIC KEY CRYPTOSYSTEMS ---
8. KEY MANAGEMENT ---
9. AUTHENTICATION ---
10. DIGITAL SIGNATURES ---
11. ELECTRONIC MAIL SECURITY ---
12. IP SECURITY ---
13. WEB SECURITY ---
14. INTRUSION ---
15. MALICIOUS SOFTWARE ---
16. FIREWALL ---
17. COMPUTER FORENSICS.

To provide the mathematical background required to understand the principles of cryptography and information security, the text explains all the relevant theorems such as Fermat s theorem and Euler s theorem. The book gives a clear analysis of various encryption methods and cipher techniques. In addition, various security measures, for example, firewalls and virtual private network, and web security, are also

There are no comments on this title.

to post a comment.