Cryptography and Network Security

  • 13h
  • Hugo Hoffman
  • BPB Publications
  • 2021

In a nutshell, Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Yet, if you want to learn more, get this comprehensive book now!This book will cover:•What is Confidentiality, Integrity, Availability•Security Incident Events and Monitoring•Security Terminologies, Security Zones•TCP SYN Flood attack, Ping of death attack•Botnet, IP & MAC Address Spoofing•DHCP Server & Client Spoofing•Social Engineering & Phishing•Spear phishing, Whaling & Pharming•Watering hole attack & Smishing•Brute Force & Dictionary Attacks•Recon Attacks and Buffer Overflow Attack•Man-in-the-middle attacks•Malware & Trojans, and Data Loss Vectors•Well Known Hacking Tools•Cryptography Basics, and Substitution Ciphers•Viginere and Hebern and Enigma Cypher•Hashing & MD5 Checksum•Hash Algorithms and Encryption Basics•Cipher Text, Encryption Keys, and Digital Signatures•Stateless Firewalls and Stateful Firewalls•Proxy Servers and Next Generation Firewalls•High Availability, Failover and Clustering•Zone-based Firewalls, IDS and IPS systems•Remote Access VPN, DMVPN and Site-to-site VPN•Securing and Managing Endpoints•Securing and Managing Network Devices•AAA, ACS, ISE and 802.1X Authentication•Syslog, Reporting, Netflow & SNMP•BYOD Security•Email Security and Blacklisting•Data Loss Prevention and moreBUY THIS BOOK NOW AND GET STARTED TODAY!

In this Book

  • An Overview of Network and Information Security
  • Introduction to Cryptography
  • Block Ciphers and Attacks
  • Number Theory Fundamentals
  • Algebraic Structures
  • Stream Ciphers and Cipher Modes
  • Secure Hash Functions
  • Message Authentication using MAC
  • Authentication and Message Integrity Using Digital Signatures
  • Advanced Encryption Standard
  • Pseudo-Random Numbers
  • Public Key Algorithms and RSA
  • Other Public Key Algorithms
  • Key Management and Exchange
  • User Authentication Using Kerberos
  • User Authentication Using Public Key Certificates
  • Email Security: PGP and SMIME
  • Transport Layer Security (TLS) and SSL
  • IP Security (IPsec)
  • Wireless Security
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)