Cyber Security : With Cryptography Essentials
Material type:
TextPublication details: Chennai McGraw Hill Education 2025Description: 534pISBN: - 9789355328250
- 005.8 SHA/C
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
Reference
|
IIIT Kottayam Central Library Reference | 005.8 SHA/C (Browse shelf(Opens below)) | Not For Loan | 2793 | ||||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 SHA/C (Browse shelf(Opens below)) | 1 | Available | 2794 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 SHA/C (Browse shelf(Opens below)) | 2 | Available | 2795 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 SHA/C (Browse shelf(Opens below)) | 3 | Available | 2796 | |||
|
|
IIIT Kottayam Central Library General Stacks | 005.8 SHA/C (Browse shelf(Opens below)) | 4 | Available | 2797 |
Browsing IIIT Kottayam Central Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
Part 1: Core Concepts
Chapter 1: Getting Started with Cryptography
Chapter 2: Getting Started with Cybersecurity
Part 2: Mathematical Foundations
Chapter 3: Computational Number Theory
Chapter 4: Computational Complexity
Chapter 5: Information Theory, Computational Indistinguishability, and Pseudo randomness
Part 3: Symmetric-Key Cryptography
Chapter 6: Ancient Ciphers
Chapter 7: Modern Symmetric Ciphers
Part 4: Asymmetric-Key Cryptography
Chapter 8: Public-Key Cryptography I
Chapter 9: Public-Key Cryptography II
Part 5: Cryptographic Security Paradigms
Chapter 10: Cryptographic Hash Functions
Chapter 11: Advances in Cryptography
Chapter 12: Cryptanalysis
Part 6: Applied Cryptography
Chapter 13: Cryptography for Network Security
There are no comments on this title.