HelpFeedback
Kahate
Information Center
Preface
Note of Appreciation
Foreword
Table of Contents
Salient Features
About the Author
Books by the Same Author
Queries & Feedback
Buy the Book


Student Edition
Instructor Edition
Cryptography and Network Security

Atul Kahate, Project Manager, i-flex solutions limited, Pune

ISBN: 0070494835
Copyright year: 2003

Salient Features



Security is one of the most significant concerns of any organisation. This book clearly explains the concepts and practical issues behind Cryptography and Network Security.

The book has a lot of visual appeal, a large number of illustrations (412) are used to aid understanding. Each chapter is followed by multiple-choice questions, review questions and design/programming exercises.

Salient Features :

  • Practice of security using JAVA and Microsoft Toolkit technologies is demonstrated and practical implementation issues are discussed.


  • Lucid explanation of technologies of Encryption, Decryption, Symmetric and Asymmetric Key Cryptography.


  • Detailed analysis and explanation of all major Cryptographic algorithms, including Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), RC5, Blowfish, Advanced Encryption Standard (AES), Rivest Shamir Adleman (RSA), Digital Signature Algorithm (DSA).


  • Discussion on Organizational Security arrangements - Firewalls, Virtual Private Networks (VPN).


  • Coverage of Digital Certificates, Digital Signatures, Public Key Infrastructure (PKI) and Extensible Markup Language (XML) Security.


  • Focus on Internet Security with coverage of Secure Socket Layer (SSL), Secure Hyper Text Transfer Protocol (SHTTP), Time, Stamping Protocol (TSP), Secure Electronic Transaction (SET), 3D Secure, Pretty Good Privacy (PGP), Privacy-Enhanced Electronic Mail (PEM), Secure Multi-Purpose Internet Mail Extensions (S/MIME).


  • Trends in Wireless Security: Wireless Application, Protocol (WAP), Global System for Mobile Telecommunication (GSM), Third Generation Services (3G).


  • Coverage of authentication mechanisms and Single Sign On (SSO) techniques.


  • A selection of case studies highlighting the various security issues including Denial of Service (DOS) attacks, voting over Internet and online banking transactions.


Small Cover

To obtain a lecturer login to the Online Learning Centres, ask your local sales representative. If you're a lecturer thinking about adopting this textbook, request a complimentary copy for review.