Cryptography and network security
Language: ENG Publication details: New Delhi Tata McGraw Hill 2013Edition: 3rdDescription: 501p. | Binding - Paperback |ISBN:- 978-1-25-902988-2
- 5.8 KAH DDC23
| Item type | Current library | Collection | Call number | Status | Barcode | |
|---|---|---|---|---|---|---|
Books
|
School of Engineering & Technology Reference Section | Reference | 005.8 KAH (Browse shelf(Opens below)) | Not For Loan | E11838 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11839 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11840 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11841 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11842 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11843 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11844 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11845 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11846 | |
Books
|
School of Engineering & Technology General Stacks | Circulation | 005.8 KAH (Browse shelf(Opens below)) | Available | E11847 |
Browsing School of Engineering & Technology shelves, Shelving location: Reference Section, Collection: Reference Close shelf browser (Hides shelf browser)
| 005.8 FLI Linux Server Hacks | 005.8 FOR/MUK Cryptography and network security | 005.8 JAI/KAL Digital forensic: the fascinating world of digital evidences | 005.8 KAH Cryptography and network security | 005.8 KOF Hacking and security | 005.8 MAT/KUM Cloud security and privacy | 005.8 MCN Network security assessment |
In its signature style, the third edition clearly presents all key concepts of the subject like Data Encryption Standard, Ciphers, IP Security and Web Security, via easy-to-follow examples and diagrams, keeping complex mathematical treatments at bay. With ample practical examples, case studies and large number of pedagogy, the book perfectly motivates readers to delve into the application aspects of the subject.
Salient Features:
Practical orientation of the subject helps students implement real-life tasks through the integrated case studies.
Inclusion of new topics like IEEE 802.11 Security, Elgamal Cryptography, Cloud Security.
Follows Bottom up approach Cryptography -> Network Security -> Case Studies.
There are no comments on this title.