The Book provide an overview of cryptography and network security. defines mathematical symbols and notation used in cryptography and network security. The second source, the contents section from this PDF, lists the chapters and sections that are included in the book. Chapters 1 through 15 of the book focus on cryptography, chapters 16 through 18 discuss network security, and appendices are included to provide additional information on a variety of related topics, including mathematical concepts and proofs. The text discusses the security goals of confidentiality, integrity, and availability, and defines different types of attacks that can be used to compromise these goals. Security services and mechanisms are then defined to provide protection against these threats. Finally, cryptography and steganography are introduced as techniques that can be used to implement security services and mechanisms.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Cryptography-Security-McGraw-Hill-Forouzan-Networking/dp/0073327530?&linkCode=ll1&tag=cvthunderx-20&linkId=1d965ac8e0b4f242d4c0bb1213b370bd&language=en_US&ref_=as_li_ss_tl
Published on 1 month, 2 weeks ago
If you like Podbriefly.com, please consider donating to support the ongoing development.
Donate