(as of May 22,2020 01:47:05 UTC – Details)
+Includes the latest material on emerging technologies, related to Internet of Things (IoT), cloud computing, smart grid, big data analytics, block chain, and more
+Features separate chapters on the mathematics related to network security and cryptography
+Introduces basic concepts in computer networks including classical cipher schemes, public key cryptography, authentication schemes, pretty good privacy, Internet security services, and system security
+Includes end of chapter review questions
Brief Table of Contents
1. Overview of Computer Networks. 2. Mathematical Foundations for Computer Networks. 3. Overview of Cryptography.
4. Mathematical Foundations for Cryptography. 5. Classical Cipher Schemes. 6. Modern Symmetric Ciphers. 7. Public-Key Cryptography for Data Confidentiality. 8. Authentication Schemes. 9. Centralized Authentication Service. 10. Public Key Infrastructure. 11. Pretty Good Privacy. 12. Internet Security Services. 13. System Security. 14. Security of Emerging Technology. Bibliography. Index.
About the Author
Sarhan M. Musa holds a PhD in electrical engineering and is currently a professor in the engineering technology department at Prairie View A&M University, Texas