Detailed coverage of security management, risk management and security and law is also provided. Smart card, biometrics, virtual private networks, trusted operating systems, pretty good privacy, database security, and intrusion detection systems have been comprehensively covered. Cryptographic algorithms and protocols underlying network security applications, including encryption, hash functions, digital signature, and key exchange have been described. Network security, network management, security principles, security attacks, and security infrastructure have been elaborately dealt with. Written in an easy-to-understand style, the book enables easy comprehension of the ideas. It also serves as a reference for professionals. Book Summary of Network Security And Management This book is designed as a text for one-semester course at the undergraduate and postgraduate levels of the Information Technology, Computer Science and Engineering disciplines.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |