Eligible for Return, Refund or Replacement within 30 days of receipt.
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The final chapter covers the security of emerging technologies such as IoT, Big Data, etc. The book is designed to meet the needs of beginners as well as more advanced readers.
Features
+Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems
+Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)
Brief Table Of Contents
1: Security Concepts. 2: Public Key Cryptography and SSL. 3: World Wide Web Transaction Security. 4: IP Security and Firewalls. 5: Public Key Certificates. 6: Security at the IP Layer. 7: Remote Access with Internet Protocol Security. 8. Virtual Private Networks. 9. The Security of Emerging Technologies. Index.
About The Authors
Both S. R. Chauhan and S. Jangra, PhD are university instructors, with over 20 years of experience teaching courses in cybersecurity and cybercrime. Both have published research articles for international journals.
Reviews
Clear filtersThere are no reviews yet.