Designing computer forensics courses using case studies to enhance computer security curricula
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
Towards a secure Frequency Monitoring NETwork (FNET) system
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
FPGA implementation for real time encryption engine for real time video
ICC'10 Proceedings of the 14th WSEAS international conference on Circuits
Proceedings of the 2011 International Conference on Communication, Computing & Security
Proposal for novel 3D password for providing authentication in critical web applications
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Visualizing secure Hash algorithm (SHA-1) on the web
AMT'11 Proceedings of the 7th international conference on Active media technology
The design of reliable routing protocols in wireless mesh networks
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Enhancing network security education with research and development content
Proceedings of the 2011 conference on Information technology education
Designing stream cipher systems using genetic programming
LION'05 Proceedings of the 5th international conference on Learning and Intelligent Optimization
Teaching the RSA algorithm using spreadsheets
Journal of Computing Sciences in Colleges
Entity authentication in a mobile-cloud environment
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
International Journal of Information Security and Privacy
Hi-index | 0.00 |
A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning. Table of contentsCryptography and Network Security1 IntroductionPart 1 Symmetric-Key Encipherment2 Mathematics of Cryptography3 Traditional Symmetric-Key Ciphers4 Mathematics of Cryptography5 Introduction to Modern Symmetric-Key Ciphers6 Data Encryption Standard (DES)7 Advanced Encryption Standard (AES)8 Encipherment Using Modern Symmetric-Key CiphersPart 2 Asymmetric-Key Encipherment9 Mathematics of Cryptography10 Asymmetric-Key CryptographyPart 3 Integrity, Authentication, and Key Management11 Message Integrity and Message Authentication12 Cryptographic Hash Functions13 Digital Signature14 Entity Authentication15 Key ManagementPart 4 Network Security16 Security at the Application Layer: PGP and S/MIME17 Security at the Transport Layer: SSL and TLS18 Security at the Network Layer: IPSec