|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Sarhan M. MusaPublisher: Mercury Learning & Information Imprint: Mercury Learning & Information Weight: 0.889kg ISBN: 9781942270836ISBN 10: 1942270836 Pages: 560 Publication Date: 11 April 2018 Audience: College/higher education , Undergraduate Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1.Overview of Computer Networks 2.Mathematical Foundations of Networking. 3.Overview of Cryptography. 4. Mathematical Foundations of Cryptography. 5. Classical Cipher Schemes. 6. Modern Symmetric Ciphers. 7. Public Key Cryptography. 8. Authentication Schemes. 9. Centralized Authentication Schemes. 10. Public Key Infrastructure. 11. Pretty Good Privacy. 12. Internet Security Services. 13. System Security. 14. Security of Emerging Technologies.ReviewsMidwest Book Review: Network Security and Cryptography covers the basic concepts of computer networks as they relate to cryptography and network security, and is recommended both for computer and network engineers and those who would survey the latest material relating to soft grids, big data analytics, blockchain, and computer network ciphers. Chapters include mathematical equations and support for this overview of cryptography and its applications in real-world network security scenarios, examining data confidentiality and internet security services alike. The result is strong in mathematical examples, reinforcement, and charts and graphs and provides professionals with a solid foundation of knowledge. Network Security and Cryptography covers the basic concepts of computer networks as they relate to cryptography and network security, and is recommended both for computer and network engineers and those who would survey the latest material relating to soft grids, big data analytics, blockchain, and computer network ciphers. Chapters include mathematical equations and support for this overview of cryptography and its applications in real-world network security scenarios, examining data confidentiality and internet security services alike. The result is strong in mathematical examples, reinforcement, and charts and graphs and provides professionals with a solid foundation of knowledge.--Midwest Book Review Author InformationMusa Sarhan M. : Sarhan M. Musa holds a PhD in electrical engineering and is currently a professor in the electrical and computer engineering department at Prairie View A&M University, Texas. Tab Content 6Author Website:Countries AvailableAll regions |