Cryptography and Network Security - Sampaio de Alencar, Marcelo; - Prospero Internet Bookshop

Cryptography and Network Security

 
Edition number: 1
Publisher: River Publishers
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 49.99
Estimated price in HUF:
25 562 HUF (24 345 HUF + 5% VAT)
Why estimated?
 
Your price:

20 450 (19 476 HUF + 5% VAT )
discount is: 20% (approx 5 112 HUF off)
Discount is valid until: 31 December 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 2-3 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
 
  Piece(s)

 
Short description:

This book provides a comprehensive introduction to the foundations of cryptography and network security. As well as a thorough presentation of the evolution of the topic the book includes information about basic hacker attacks, alternatives to prevent attacks, ways to increase data protection and how to set up and implement secure protocols.

Long description:

Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. The basics of information theory, how to measure information, and the information associated with a source are discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. Appendices include a review of probability theory, a discussion of cryptoalgorithms and cryptosystems, and a glossary of information security terms. Illustrations and graphics help the reader understand the theory.

Table of Contents:

1. Introduction  2. Main Definitions  3. Information Theory  4. Source Coding  5. Information Transmission and Channel Capacity  6. Computer Networks  7. Network Protocols and Architecture  8. The TCP/IP Protocol  9. Network Security  10. Theoretical Cryptography  11. The Hash Function  12. Criminal Cases