Network Security and Cryptography: A Self-Teaching Introduction

  • 6h 26m
  • Sarhan M. Musa
  • Mercury Learning
  • 2018

Network Security and Cryptography introduces the basic concepts in computer networks and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science and electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.

FEATURES:

Includes the latest material on emerging technologies, related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more

Features separate chapters on the mathematics related to network security and cryptography

Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security

Includes end of chapter review questions

About the Author

Sarhan M. Musa holds a PhD in electrical engineering and is currently an associate professor in the engineering technology department at Prairie View A&M University, Texas.

In this Book

  • Overview of Computer Networks
  • Mathematical Foundations for Computer Networks
  • Overview of Cryptography
  • Mathematical Foundations for Cryptography
  • Classical Cipher Schemes
  • Modern Symmetric Ciphers
  • Public-Key Cryptography for Data Confidentiality
  • Authentication Schemes
  • Centralized Authentication Service
  • Public Key Infrastructure (PKI)
  • Pretty Good Privacy
  • Internet Security Services
  • System Security
  • Security of Emerging Technology
  • Bibliography
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE