000 | 02704nam a22002177a 4500 | ||
---|---|---|---|
999 |
_c2199 _d2199 |
||
005 | 20220225112626.0 | ||
008 | 220225b ||||| |||| 00| 0 eng d | ||
020 | _a9789386858948 | ||
082 |
_a005.8 _bMEN |
||
100 |
_aMenezes, Bernard _95084 |
||
245 | _aCryptography, network security, and cyber laws | ||
260 |
_bCengage Learning India Pvt. Ltd. _aNew Delhi _c2018 |
||
300 | _axix, 488 p. | ||
365 |
_aINR _b499.00 |
||
504 | _aTable of content 1. Introduction 2. Computer Networking Primer 3. Mathematical Background for Cryptography 4. Basics of Cryptography 5. Secret Key Cryptography 6. Public Key Cryptography and RSA 7. Cryptographic Hash 8. Discrete Logarithm and its Applications 9. Elliptic Curve Cryptography and Advanced Encryption Standard 10. Key Management 11. Authentication–I 12. Authentication–II 13. IPSec—Security at the Network Layer 14. Security at the Transport Layer 15. IEEE 802.11 Wireless LAN Security 16. Cellphone Security 17. Non-Cryptographic Protocol Vulnerabilities 18. Software Vulnerabilities 19. Viruses, Worms, and Other Malware 20. Access Control in the Operating System 21. Firewalls 22. Intrusion Prevention and Detection 23. RFIDs and E-Passports 24. Electronic Payment 25. Web Services Security 26. Internet Law and Cyber Crimes 27. The Information Technology Act, 2000 | ||
520 | _aHardly a month passes without a news splash on cyber security—be it a new virus strain, botnets, denial of service, or a high-profile break-in. Security was once the preserve of the military and, more recently, of banks. Today, awareness of security policy and practices has moved to the homes and offices of people at large. We are more dependent on the Internet than ever before—for banking, e-trading, e-commerce, and more. All of a sudden it seems like identity theft, phishing attacks, and spyware are everyone's concerns. Indeed, given the stakes involved, it is hardly surprising that many corporations worldwide have increased their spending on IT security over the last ten years. Risk analysis, security policy and management, compliance, etc., all come under the purview of security. This book, Cryptography, Network Security, and Cyber Laws, is principally about providing and understanding technological solutions to security. It is about the underlying vulnerabilities in systems, services, and communication protocols. It is about their exploitation and methods to defend against them. | ||
650 |
_aComputer networks- Security measures _95638 |
||
650 |
_aData encryption (Computer science) _95639 |
||
700 |
_aKumar, Ravinder _95136 |
||
942 |
_2ddc _cBK |