IIIT Kottayam Logo
Indian Institute of Information Technology Kottayam
भारतीय सूचना प्रौद्योगिकी संस्थान कोट्टायम
Library Catalogue
Amazon cover image
Image from Amazon.com

Cyber Security : With Cryptography Essentials

By: Material type: TextTextPublication details: Chennai McGraw Hill Education 2025Description: 534pISBN:
  • 9789355328250
Subject(s): DDC classification:
  • 005.8 SHA/C
Contents:
Part 1: Core Concepts Chapter 1: Getting Started with Cryptography Chapter 2: Getting Started with Cybersecurity Part 2: Mathematical Foundations Chapter 3: Computational Number Theory Chapter 4: Computational Complexity Chapter 5: Information Theory, Computational Indistinguishability, and Pseudo randomness Part 3: Symmetric-Key Cryptography Chapter 6: Ancient Ciphers Chapter 7: Modern Symmetric Ciphers Part 4: Asymmetric-Key Cryptography Chapter 8: Public-Key Cryptography I Chapter 9: Public-Key Cryptography II Part 5: Cryptographic Security Paradigms Chapter 10: Cryptographic Hash Functions Chapter 11: Advances in Cryptography Chapter 12: Cryptanalysis Part 6: Applied Cryptography Chapter 13: Cryptography for Network Security
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
Reference Reference IIIT Kottayam Central Library Reference 005.8 SHA/C (Browse shelf(Opens below)) Not For Loan 2793
Books Books IIIT Kottayam Central Library General Stacks 005.8 SHA/C (Browse shelf(Opens below)) 1 Available 2794
Books Books IIIT Kottayam Central Library General Stacks 005.8 SHA/C (Browse shelf(Opens below)) 2 Available 2795
Books Books IIIT Kottayam Central Library General Stacks 005.8 SHA/C (Browse shelf(Opens below)) 3 Available 2796
Books Books IIIT Kottayam Central Library General Stacks 005.8 SHA/C (Browse shelf(Opens below)) 4 Available 2797
Total holds: 0

Part 1: Core Concepts
Chapter 1: Getting Started with Cryptography
Chapter 2: Getting Started with Cybersecurity

Part 2: Mathematical Foundations
Chapter 3: Computational Number Theory
Chapter 4: Computational Complexity
Chapter 5: Information Theory, Computational Indistinguishability, and Pseudo randomness

Part 3: Symmetric-Key Cryptography

Chapter 6: Ancient Ciphers
Chapter 7: Modern Symmetric Ciphers

Part 4: Asymmetric-Key Cryptography
Chapter 8: Public-Key Cryptography I
Chapter 9: Public-Key Cryptography II

Part 5: Cryptographic Security Paradigms
Chapter 10: Cryptographic Hash Functions
Chapter 11: Advances in Cryptography
Chapter 12: Cryptanalysis

Part 6: Applied Cryptography
Chapter 13: Cryptography for Network Security

There are no comments on this title.

to post a comment.

IIIT Kottayam Central Library,Valavoor.P.O, Kottayam-686635,Kerala | Phone: 0482-2202104, Mobile: 9961452785| library@iiitkottayam.ac.in

Visit counter For Websites

Visitor Count: 0