|
|
Click the serial number on the left to view the details of the item. |
# |
Author | Title | Accn# | Year | Item Type | Claims |
1 |
Richard R. Brooks |
Introduction to computer and network security: Navigating Shades of Gray |
025955 |
2014 |
Book |
|
2 |
Alexander Stanoyevitch |
Introduction to cryptography: With Mathematical Functions and Computer Implementations |
025888 |
2013 |
Book |
|
3 |
Serge Vaudenay |
Classical introduction to cryptography: Applications for communications security |
022594 |
2006 |
Book |
|
4 |
Simon Singh |
Code book: The secret history of codes and codebreaking |
E00979 |
|
Book |
|
5 |
LOEPP, SUSAN |
Protecting information: From classical error correction to quantum crytography |
021064 |
2006 |
Book |
|
6 |
Coutinho, S.C. |
Mathematics of ciphers: Number theory and RSA cryptography |
018308 |
1999 |
Book |
|
7 |
Hans Delfs |
Introduction to cryptography : Principles and applications |
018055 |
2002 |
Book |
|
8 |
M.R. Schroeder |
Number theory in science and communication With applicaitons\in cryptography, physics, digital information, computing, and self |
016679 |
1997 |
Book |
|
9 |
Philip Zimmermann |
PGP source code and internals |
012896 |
1995 |
Book |
|
10 |
Helen Fouche Gaines |
Cryptanalysis: A study of ciphers and their solution |
004348 |
1956 |
Book |
|
|
1.
|
|
Title | Introduction to computer and network security: Navigating Shades of Gray |
Author(s) | Richard R. Brooks |
Publication | Boca Taton, CRC Press, 2014. |
Description | xxiv, 205p. |
Abstract Note | Taking an interactive, "learn-by-doing" approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security. Unlike most computer security books, which concentrate on software design and implementation, cryptographic tools, or networking issues, this text also explores how the interactions between hardware, software, and users affect system security.
The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Students see the importance of these concepts in existing and future technologies. In a challenging yet enjoyable way, they learn about a variety of technical topics, including current security exploits, technical factors that enable attacks, and economic and social factors that determine the security of future systems. |
ISBN,Price | 9781439860717 : UKP 49.99(HB) |
Classification | 681.324
|
Keyword(s) | 1. COMPUTER NETWORK SECURITY
2. COMPUTER NETWORKS
3. CRYPTOGRAPHY
4. NETWORK SECURITY
5. POLYMORPHIC VIRUS
6. WEB SECURITY
|
Item Type | Book |
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
025955 |
|
681.324/BRO/025955 |
On Shelf |
|
|
|
+Copy Specific Information |
2.
|
|
Title | Introduction to cryptography: With Mathematical Functions and Computer Implementations |
Author(s) | Alexander Stanoyevitch |
Publication | Boca Raton, CRC Press, 2013. |
Description | xix, 649p. |
Series | (Descrete Mathematics and its Applications) |
Abstract Note | Book provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed.
Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms.
As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography. |
ISBN,Price | 9781439817636 : Rs. 5495.00(HB) |
Classification | 512:003.26
|
Keyword(s) | 1. CODING THEORY
2. CRYPTOGRAPHY
3. DATA ENCRYPTION
|
Item Type | Book |
Circulation Data
Accession# | |
Call# | Status | Issued To | Return Due On | Physical Location |
025888 |
|
512:003.26/STA/025888 |
On Shelf |
|
|
|
+Copy Specific Information | |