000 02704nam a22002177a 4500
999 _c2199
_d2199
005 20220225112626.0
008 220225b ||||| |||| 00| 0 eng d
020 _a9789386858948
082 _a005.8
_bMEN
100 _aMenezes, Bernard
_95084
245 _aCryptography, network security, and cyber laws
260 _bCengage Learning India Pvt. Ltd.
_aNew Delhi
_c2018
300 _axix, 488 p.
365 _aINR
_b499.00
504 _aTable of content 1. Introduction 2. Computer Networking Primer 3. Mathematical Background for Cryptography 4. Basics of Cryptography 5. Secret Key Cryptography 6. Public Key Cryptography and RSA 7. Cryptographic Hash 8. Discrete Logarithm and its Applications 9. Elliptic Curve Cryptography and Advanced Encryption Standard 10. Key Management 11. Authentication–I 12. Authentication–II 13. IPSec—Security at the Network Layer 14. Security at the Transport Layer 15. IEEE 802.11 Wireless LAN Security 16. Cellphone Security 17. Non-Cryptographic Protocol Vulnerabilities 18. Software Vulnerabilities 19. Viruses, Worms, and Other Malware 20. Access Control in the Operating System 21. Firewalls 22. Intrusion Prevention and Detection 23. RFIDs and E-Passports 24. Electronic Payment 25. Web Services Security 26. Internet Law and Cyber Crimes 27. The Information Technology Act, 2000
520 _aHardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years. Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them.
650 _aComputer networks- Security measures
_95638
650 _aData encryption (Computer science)
_95639
700 _aKumar, Ravinder
_95136
942 _2ddc
_cBK