Computer Security and Encryption
An Introduction
- Publisher
Mercury Learning and Information - Published
9th July 2020 - ISBN 9781683925316
- Language English
- Pages 350 pp.
- Size 7" x 9"
Library E-Books
We are signed up with aggregators who resell networkable e-book editions of our titles to academic libraries. These editions, priced at par with simultaneous hardcover editions of our titles, are not available direct from Stylus.
These aggregators offer a variety of plans to libraries, such as simultaneous access by multiple library patrons, and access to portions of titles at a fraction of list price under what is commonly referred to as a "patron-driven demand" model.
- Publisher
Mercury Learning and Information - Published
26th June 2020 - ISBN 9781683925293
- Language English
- Pages 350 pp.
- Size 7" x 9"
E-books are now distributed via VitalSource
VitalSource offer a more seamless way to access the ebook, and add some great new features including text-to-voice. You own your ebook for life, it is simply hosted on the vendor website, working much like Kindle and Nook. Click here to see more detailed information on this process.
- Publisher
Mercury Learning and Information - Published
26th June 2020 - ISBN 9781683925309
- Language English
- Pages 350 pp.
- Size 7" x 9"
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers.
Features:
- Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems
- Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)
1: Security Concepts
2: Public Key Crypto and SSL
3:
World Wide Web Transaction Security
4: IPSEC and Firewalls
5: Public Key
Certificates
6: Security at the IP Layer
7: Remote Access with IPSEC
8.
Virtual Private Networks
9. Security of Emerging Technology
Index
S. R. Chauhan
S. R. Chauhan is a university instructor with over 20 years of experience teaching courses in cybersecurity and cybercrime.
S. Jangra
S. Jangra, PhD is a university instructor with over 20 years of experience teaching courses in cybersecurity and cybercrime.