Contact us on (02) 8445 2300
For all customer service and order enquiries

Woodslane Online Catalogues

9781683928836 Add to Cart Academic Inspection Copy

Network Security and Cryptography

Description
Author
Biography
Table of
Contents
Google
Preview

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.

FEATURES:

  • Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more
  • Features separate chapters on the mathematics related to network security and cryptography
  • Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security
  • Includes end of chapter review questions

Sarhan M. Musa holds a PhD in electrical engineering and is currently a professor in the engineering technology department at Prairie View A&M University, Texas.

1. Overview of Computer Networks 2. Mathematical Foundations forComputer Networks 3. Overview of Cryptography 4. Mathematical Foundations for Cryptography 5. Classical Cipher Schemes 6. Modern Symmetric Ciphers 7. Public-Key Cryptography for Data Confidentiality 8. Authentication Schemes 9. Centralized Authentication Service 10. Public Key Infrastructure 11. Pretty Good Privacy 12. Internet Security Services 13. System Security 14. Security of Emerging Technology 15: Artificial Intelligence Security Bibliography Index

Google Preview content