• Complain

Marcelo Sampaio de Alencar - Cryptography and Network Security

Here you can read online Marcelo Sampaio de Alencar - Cryptography and Network Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Gistrup, year: 2022, publisher: River Publishers, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Marcelo Sampaio de Alencar Cryptography and Network Security

Cryptography and Network Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cryptography and Network Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Starting with the historical facts behind the concept of information, which led to the creation of computer networks, Internet of things and cryptocurrencies, the book then arrives at the main definitions of cryptography and network security, the protocols that keep the systems running and the cybercrimes that could disrupt the systems. The basics of information theory, how to measure information, and the information associated with a source are discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. Appendices include a review of probability theory, a discussion of cryptoalgorithms and cryptosystems, and a glossary of information security terms. Illustrations and graphics help the reader understand the theory.

Marcelo Sampaio de Alencar: author's other books


Who wrote Cryptography and Network Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cryptography and Network Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cryptography and Network Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cryptography and Network Security RIVER PUBLISHERS SERIES IN SECURITY AND - photo 1
Cryptography and Network Security
RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS

Series Editors:

ANAND R. PRASAD

Deloitte Tohmatsu Cyber LLC in Japan

ABDERRAHIM BENSLIMANE

University of Avignon France

R. CHANDRAMOULI

Stevens Institute of Technology USA

PETER LANGENDRFER

Brandenburg University of Technology, Leibniz Institute for High Performance High PerformanceMicroelectronics (IHP) Germany

The River Publishers Series in Security and Digital Forensics is a series ofcomprehensive academic and professional books which focus on the theory andapplications of Cyber Security, including Data Security, Mobile and Network Security,Cryptography and Digital Forensics. Topics in Prevention and Threat Management arealso included in the scope of the book series, as are general business Standards in thisdomain.

Books published in the series include research monographs, edited volumes,handbooks and textbooks. The books provide professionals, researchers, educators, andadvanced students in the field with an invaluable insight into the latest research anddevelopments.

Topics covered in the series include, but are by no means restricted to the following:

  • Cyber Security
  • Digital Forensics
  • Cryptography
  • Blockchain
  • IoT Security
  • Network Security
  • Mobile Security
  • Data and App Security
  • Threat Management
  • Standardization
  • Privacy
  • Software Security
  • Hardware Security

For a list of other books in this series, visit www.riverpublishers.com

Cryptography and Network Security

Marcelo Sampaio de Alencar

Institute of Advanced Studies in Communications University Center Senai Cimatec, Salvador

Published 2022 by River Publishers River Publishers Alsbjergvej 10 9260 - photo 2

Published 2022 by River Publishers

River Publishers

Alsbjergvej 10, 9260 Gistrup, Denmark

www.riverpublishers.com

Distributed exclusively by Routledge

4 Park Square, Milton Park, Abingdon, Oxon OX14 4RN

605 Third Avenue, New York, NY 10017, USA

Cryptography and Network Security / by Marcelo Sampaio de Alencar.

2022 River Publishers. All rights reserved. No part of this publication may be reproduced, stored in a retrieval systems, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers.

Routledge is an imprint of the Taylor & Francis Group, an informa business

ISBN 978-87-7022-407-9 (print)

ISBN 978-10-0079-293-5 (online)

ISBN 978-1-003-33776-8 (ebook master)

While every effort is made to provide dependable information, the publisher, authors, and editors cannot be held responsible for any errors or omissions.

I dedicate this book to my family.

Preface

The enemy knows the system.

Claude Shannon

Cryptography and network security is a hot topic in the educational market. It evolved from the amalgamation of different areas of mathematics, logic, computer networks, probability, and stochastic processes, and includes the beautiful development of Communication Theory by Claude Shannon, in 1948.

The area of cryptography and network security is fundamental to several branches of knowledge, including engineering, computer science, mathematics, physics, sciences, economics, social sciences, and social communication. It is part of the syllabus for most courses in computer science, mathematics, and engineering.

For electrical engineering courses, it follows some disciplines, including communication systems, transmission techniques, error control coding, estimation, and digital signal processing. This book is self-contained, and it is a reference and an introduction for graduate students who did not take information theory before. It could also be used as an undergraduate textbook.

It is addressed to a large audience in electrical and computer engineering, or mathematics and applied physics. The book targets graduate students and engineers in these areas, who may not have taken basic courses in specific topics, and who will find a concise way to obtain the knowledge they need to succeed in advanced courses.

According to a study published by the Institute of Electrical and Electronics Engineers (IEEE), the companies, enterprises, and industry are in need of professionals with a solid background on mathematics and sciences, instead of the specialized professional of the previous century. The employment market in this area is in demand of information technology professionals and engineers who could afford to change and learn as the market changes. The market needs professionals who can model and design.

In this regard, few books have been published covering the subjects needed to understand the very fundamental concepts of cryptography and network security. Most books that deal with the subject are usually destined to very specific audiences.

The more mathematically oriented books are seldom used by people with engineering, economics, or statistical background because the authors are more interested in theorems and related conditions than in fundamental concepts and applications. The books written for engineers and software professionals usually lack the required rigor, or skip some important points in favor of simplicity and conciseness.

The idea is to present a seamless connection between the more abstract advanced Information Theory and the fundamental concepts of coding theory and computer networks and protocols, filling in the gaps from previous books and leading to an interesting, robust, and, hopefully, self-contained exposition of cryptography and network security.

The book begins with the historical evolution of networks and security in .

, along with the basic hacker attacks, alternatives to prevent attacks, data protection, and secure protocols.

The information theoretical aspects of cryptography are presented in .

includes a complete glossary of information security terms. A short biography of the author is presented before the bibliography. The book also includes a remissive index to help the readers find the location of the adequate information.

Marcelo S. Alencar

Acknowledgements

The publication of this book is the result of the experience acquired by the author throughout the years, combined with the knowledge received from professors and conveyed by book authors.

This book evolved during the many years of the authors work at the Federal University of Campina Grande (UFCG), the Federal University of Paraba (UFPB), the University for the Development of the State of Santa Catarina (UDESC), the Federal University of Bahia (UFBA), the Senai Cimatec University Center, Salvador, and the Institute of Advanced Studies in Communications (Iecom).

It has been a privilege to cooperate with several companies, firms, and institutions, for many years, including Embratel, Atecel, Correios do Brasil, Telern, Chesf, and Telpa. This cooperation also involved the companies Telpe, TIM, Siemens, Oi, Telebrs, Alpargatas S/A, Licks Attorneys, and the National Telecommunications Agency (Anatel).

The author thanks the authoritative translation of some of the chapters by Thiago Tavares de Alencar, and the complete revision of the text performed by Junko Nakajima. Any mistakes, found perchance in the text, are exclusive responsibility of the author.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cryptography and Network Security»

Look at similar books to Cryptography and Network Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cryptography and Network Security»

Discussion, reviews of the book Cryptography and Network Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.