
- 298 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Cryptography and Network Security
About this book
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Half Title page
- Series Page
- Title Page
- Copyright Page
- Dedication
- Contents
- Preface
- Acknowledgements
- List of Figures
- List of Tables
- 1 Introduction
- 2 Main Definitions
- 3 Information Theory
- 4 Source Coding
- 5 Information Transmission and Channel Capacity
- 6 Computer Networks
- 7 Network Protocols and Architecture
- 8 The TCP/IP Protocol
- 9 Network Security
- 10 Theoretical Cryptography
- 11 The Hash Function
- 12 Criminal Cases
- Appendix A Probability Theory
- Appendix B Cryptoalgorithms and Cryptosystems
- Appendix C Glossary of Information Security Terms
- References
- Index
- About the Author