Normal view MARC view ISBD view

Cryptography and network security

By: Kahate, Atul.
Publisher: New Delhi Tata McGraw Hill 2013Edition: 3rd.Description: 501p. | Binding - Paperback |.ISBN: 978-1-25-902988-2.Subject(s): EXTC EngineeringDDC classification: 5.8
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
 Text Books Text Books School of Engineering & Technology
Reference Section
Reference 005.8 KAH (Browse shelf) Not For Loan E11838
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11839
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11840
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11841
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11842
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11843
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11844
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11845
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11846
 Text Books Text Books School of Engineering & Technology
General Stacks
Circulation 005.8 KAH (Browse shelf) Available E11847
Total holds: 0

In its signature style, the third edition clearly presents all key concepts of the subject like Data Encryption Standard, Ciphers, IP Security and Web Security, via easy-to-follow examples and diagrams, keeping complex mathematical treatments at bay. With ample practical examples, case studies and large number of pedagogy, the book perfectly motivates readers to delve into the application aspects of the subject.
Salient Features:

Practical orientation of the subject helps students implement real-life tasks through the integrated case studies.
Inclusion of new topics like IEEE 802.11 Security, Elgamal Cryptography, Cloud Security.
Follows Bottom up approach Cryptography -> Network Security -> Case Studies.

There are no comments for this item.

Log in to your account to post a comment.
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha