Network Security and Cryptography: A Self-Teaching Introduction, Second Edition

  • 6h 34m
  • Sarhan M. Musa
  • Mercury Learning
  • 2022

This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and introduces basic concepts in computer networks such as classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, and Internet security. It features a new chapter on artificial intelligence security and the latest material on emerging technologies, related to IoT, cloud computing, SCADA, blockchain, smart grid, big data analytics, and more. Primarily intended as a textbook for courses in computer science, electronics & communication, the book also serves as a basic reference and refresher for professionals in these areas.

FEATURES:

  • Includes a new chapter on artificial intelligence security, the latest material on emerging technologies related to IoT, cloud computing, smart grid, big data analytics, blockchain, and more
  • Features separate chapters on the mathematics related to network security and cryptography
  • Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security
  • Includes end of chapter review questions

About the Author

Sarhan M. Musa, Ph.D. teaches numerous courses at Prairie View A&M University, Texas and is the author of several books including Computational Nanophotonics (CRC Press) and Finite Element Analysis(MLI).

In this Book

  • Preface
  • Overview of Computer Networks
  • Mathematical Foundations for Computer Networks
  • Overview of Cryptography
  • Mathematical Foundations for Cryptography
  • Classical Cipher Schemes
  • Modern Symmetric Ciphers
  • Public-Key Cryptography for Data Confidentiality
  • Authentication Schemes
  • Centralized Authentication Service
  • Public Key Infrastructure (PKI)
  • Pretty Good Privacy
  • Iternet Security Services
  • System Security
  • Security of Emerging Technology
  • Artificial Intelligence Security
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)
Rating 4.9 of 12 users Rating 4.9 of 12 users (12)