CRYPTOGRAPHY AND NETWORK SECURITY
Material type: TextPublication details: Tata Mc-Hill 2009Subject(s): Online resources:Item type | Current library | Call number | URL | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | Amity Central Library ASET CSE | 005.82 KAH-C (Browse shelf(Opens below)) | Link to resource | Available | 11397 | ||
Books | Amity Central Library ASET CSE | 005.82 KAH-C (Browse shelf(Opens below)) | Link to resource | Available | 11398 | ||
Books | Amity Central Library ASET CSE | 005.82 KAH-C (Browse shelf(Opens below)) | Link to resource | Available | 11399 | ||
Books | Amity Central Library ASET CSE | 005.82 KAH-C (Browse shelf(Opens below)) | Link to resource | Available | 11400 | ||
Books | Amity Central Library ASET CSE | 005.82 KAH-C (Browse shelf(Opens below)) | Link to resource | Available | 11401 |
Browsing Amity Central Library shelves, Shelving location: ASET CSE Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||||
005.82 KAH-C CRYPTOGRAPHY AND NETWORK SECURITY | 005.82 KAH-C CRYPTOGRAPHY AND NETWORK SECURITY | 005.82 KAH-C CRYPTOGRAPHY AND NETWORK SECURITY | 005.82 KAH-C CRYPTOGRAPHY AND NETWORK SECURITY | 005.82 KAH-C CRYPTOGRAPHY AND NETWORK SECURITY | 005.82 KAH-C Cryptography and Network Security | 005.82 KAH-C Cryptography and Network Security |
Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2 Mathematics of Cryptography 3 Traditional Symmetric-Key Ciphers 4 Mathematics of Cryptography 5 Introduction to Modern Symmetric-Key Ciphers 6 Data Encryption Standard (DES) 7 Advanced Encryption Standard (AES) 8 Encipherment Using Modern Symmetric-Key Ciphers Part 2 Asymmetric-Key Encipherment 9 Mathematics of Cryptography 10 Asymmetric-Key Cryptography Part 3 Integrity, Authentication, and Key Management 11 Message Integrity and Message Authentication 12 Cryptographic Hash Functions 13 Digital Signature 14 Entity Authentication 15 Key Management Part 4 Network Security 16 Security at the Application Layer: PGP and S/MIME 17 Security at the Transport Layer: SSL and TLS 18 Security at the Network Layer: IPSec
There are no comments on this title.