|
In this age of universal electronic connectivity, viruses and hackers, electronic eavesping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Salient Features
• Use of Sage to illustrate cryptographic algorithms: The Sage computer algebra system is used to provide numerous examples of cryptographic algorithms and is also used as the basis for numerous hands-on assignments. • Comprehensive up-to-date survey of cryptographic algorithms. The student gains an understanding of all of important cryptographic algorithms and is able to assess their relative strengths and weaknesses. • Complete coverage of authentication and digital signatures. Enables the student to compare and evaluate competing approaches, and thus understand each better. • Unified, comprehensive treatment of mutual trust topics. Key management and user authentication are fundamental to the successful use of cryptographic services. • Excellent collection of homework problems. Approximately 300 problems reinforce material in the text and also introduce new concepts and techniques. • Solid yet easy-to-follow mathematical background. It is impossible to assess the relative strengths of various approaches without some understanding of number theory and probability. • Comprehensive, up-to-date coverage of IP Security. IPSec is one of the most complex and one of the most important of the new network security standards. • Comprehensive, up-to-date coverage of wireless network Security. The student gains an understanding of the importance of this topic. • Coverage of both PGP and S/MIME for electronic mail security: These are the two most important approaches to email security. • Comprehensive and unified discussion of intruders and viruses. The threats of intruders (hackers) and viruses are distinct, but there are also similarities ISBN - 9789332518773
|
|
Pages : 660
|