Cryptography and Network Security at Meripustak

Cryptography and Network Security

Books from same Author: Bhushan Trivedi Savita Gandhi

Books from same Publisher: BPB Publications

Related Category: Author List / Publisher List


  • Retail Price: ₹ 1299/- [ 5.00% off ]

    Seller Price: ₹ 1234

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 5.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 5.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Bhushan Trivedi Savita Gandhi
    PublisherBPB Publications
    ISBN9789389328660
    Pages716
    BindingPaperback
    LanguageEnglish
    Publish YearJanuary 2022

    Description

    BPB Publications Cryptography and Network Security by Bhushan Trivedi Savita Gandhi

    Explore private and public key-based solutions and their applications in the real world. Learn about security protocols implemented at various TCP/IP stack layers. Insight on types of ciphers, their modes, and implementation issues. DESCRIPTION Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail. WHAT YOU WILL LEARN Describe and show real-world connections of cryptography and applications of cryptography and secure hash functions. How one can deploy User Authentication, Digital Signatures, and AES Encryption process. How the real-world protocols operate in practice and their theoretical implications. Describe different types of ciphers, exploit their modes for solving problems, and finding their implementation issues in system security. Explore transport layer security, IP security, and wireless security. WHO THIS BOOK IS FOR This book is for security professionals, network engineers, IT managers, students, and teachers who are interested in learning Cryptography and Network Security.