Cryptography, network security, and cyber laws
Material type: TextPublication details: Cengage Learning India Pvt. Ltd. New Delhi 2018Description: xix, 488 pISBN:- 9789386858948
- 005.8 MEN
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Book | Indian Institute of Management LRC General Stacks | IT & Decisions Sciences | 005.8 MEN (Browse shelf(Opens below)) | 1 | Available | 001942 |
Browsing Indian Institute of Management LRC shelves, Shelving location: General Stacks, Collection: IT & Decisions Sciences Close shelf browser (Hides shelf browser)
Table of content
1. Introduction
2. Computer Networking Primer
3. Mathematical Background for Cryptography
4. Basics of Cryptography
5. Secret Key Cryptography
6. Public Key Cryptography and RSA
7. Cryptographic Hash
8. Discrete Logarithm and its Applications
9. Elliptic Curve Cryptography and Advanced Encryption Standard
10. Key Management
11. Authentication–I
12. Authentication–II
13. IPSec—Security at the Network Layer
14. Security at the Transport Layer
15. IEEE 802.11 Wireless LAN Security
16. Cellphone Security
17. Non-Cryptographic Protocol Vulnerabilities
18. Software Vulnerabilities
19. Viruses, Worms, and Other Malware
20. Access Control in the Operating System
21. Firewalls
22. Intrusion Prevention and Detection
23. RFIDs and E-Passports
24. Electronic Payment
25. Web Services Security
26. Internet Law and Cyber Crimes
27. The Information Technology Act, 2000
Hardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years.
Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.
There are no comments on this title.