0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Classical and Modern Cryptography for Beginners (1st ed. 2023): Rajkumar Banoth, Rekha Regar Classical and Modern Cryptography for Beginners (1st ed. 2023)
Rajkumar Banoth, Rekha Regar
R1,905 Discovery Miles 19 050 Ships in 10 - 15 working days

This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms.  Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet.  This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.

A Comprehensive Guide to Information Security Management and Audit (Hardcover): Rajkumar Banoth, Gugulothu Narsimha, Aruna... A Comprehensive Guide to Information Security Management and Audit (Hardcover)
Rajkumar Banoth, Gugulothu Narsimha, Aruna Kranthi Godishala
R3,573 Discovery Miles 35 730 Ships in 12 - 19 working days

The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies

Computer organization & operating systems (Paperback): Rajkumar Banoth, Aruna Kranthi Godishala Computer organization & operating systems (Paperback)
Rajkumar Banoth, Aruna Kranthi Godishala
R2,536 Discovery Miles 25 360 Ships in 10 - 15 working days
Computer Forensics (Paperback): Rajkumar Banoth, Aruna Kranthi Godishala Computer Forensics (Paperback)
Rajkumar Banoth, Aruna Kranthi Godishala
R1,533 Discovery Miles 15 330 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sugar Free Saxophone - The Life and…
Derek Ansell Hardcover R745 Discovery Miles 7 450
Solitary Refinement - Chromatics, Chords…
Nadina Mackie Jackson Hardcover R1,301 Discovery Miles 13 010
Hopkins - The Organ, Its History and…
Edward J. Hopkins, Edward F. Rimbault Hardcover R1,201 Discovery Miles 12 010
The Allen Vizzutti Trumpet Method Book 1…
Allen Vizzutti Sheet music R615 Discovery Miles 6 150
How To Play Violin
Howexpert, Somer Taylor Hardcover R789 Discovery Miles 7 890
Suzuki Flute School CD, Volume 1 & 2…
Toshio Takahashi CD R366 R332 Discovery Miles 3 320
Woodwind Music of Black Composers
Aaron Horne Hardcover R2,573 Discovery Miles 25 730
The Joy of Clarinet - Easy, Familiar…
Jerome Goldstein Book R454 Discovery Miles 4 540
The Horn Handbook
Verne Reynolds Hardcover R954 Discovery Miles 9 540
How to Love Your Flute - A Guide to…
Mark Shepard Paperback R377 Discovery Miles 3 770

 

Partners