ISBN13: | 9788770042567 |
ISBN10: | 877004256X |
Binding: | Paperback |
No. of pages: | 322 pages |
Size: | 234x156 mm |
Weight: | 594 g |
Language: | English |
Illustrations: | 58 Illustrations, black & white |
697 |
The basics of mathematics and mathematical logic
Computer architecture, logic design
Computer networks in general
Privacy, data security
Safety and health aspects of computing
The basics of mathematics and mathematical logic (charity campaign)
Computer architecture, logic design (charity campaign)
Computer networks in general (charity campaign)
Privacy, data security (charity campaign)
Safety and health aspects of computing (charity campaign)
Cryptography and Network Security
GBP 49.99
Click here to subscribe.
Not in stock at Prospero.
This book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the topic the book includes information about basic hacker attacks, alternatives to prevent attacks, ways to increase data protection and how to set up and implement secure protocols.
Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. The basics of information theory, how to measure information, and the information associated with a source are discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. Appendices include a review of probability theory, a discussion of cryptoalgorithms and cryptosystems, and a glossary of information security terms. Illustrations and graphics help the reader understand the theory.
1. Introduction 2. Main Definitions 3. Information Theory 4. Source Coding 5. Information Transmission and Channel Capacity 6. Computer Networks 7. Network Protocols and Architecture 8. The TCP/IP Protocol 9. Network Security 10. Theoretical Cryptography 11. The Hash Function 12. Criminal Cases