Introduction to modern cryptography and network security / Thomas Wilkins.
By: Wilkins, Thomas [author.]
Language: English Publisher: Wilmington, USA : American Academic Publisher, [2024]Copyright date: © 2024Description: xiii, 351 pages ; 26 cmContent type: text Media type: unmediated Carrier type: volumeISBN: 9781666869453Subject(s): Cryptography | Computer networks -- Security measuresDDC classification: 005.8/2Item type | Current location | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
![]() |
COLLEGE LIBRARY | COLLEGE LIBRARY SUBJECT REFERENCE | 005.82 W658 2023 (Browse shelf) | Available | CITU-CL-53615 |
Browsing COLLEGE LIBRARY Shelves , Shelving location: SUBJECT REFERENCE Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 W938 2015 Advanced persistent threat hacking : the art and science of hacking any organization / | 005.82 H266 2011 Security strategies in Web applications and social networking / | 005.82 H2758 2017 Data hiding techniques in Windows OS : a practical approach to investigation and defense / | 005.82 W658 2023 Introduction to modern cryptography and network security / | 005.822 C11 2007 Simple computer security : disinfect your PC / | 005.822 Ea79 2006 Computer security fundamentals / | 005.822 St83 2004 Network security foundations / |
Thomas Wilkins is a computer scientist with a Ph.D. He made a significant contribution to comprehending the broad range of technological breakthroughs in computer networking and architecture. Cryptography and network security, intrusion prevention, innovative computer architectures, and the application of information technology for social advantages (including low-cost protocols for web-based electronics) are among his research interest. He teaches undergraduate and postgraduate students in Computer Engineering courses on Computer Networks, Information Security and Applications, and Public Key Infrastructure. He has advised state agencies, computer and software companies, and major users on the design, selection, and usage of networking software and devices in his capacity as a consultant.
Includes bibliographical references and index.
Chapter 1. Introduction -- Chapter 2. Fundamentals of cryptography -- Chapter 3. Cryptography and security -- Chapter 4. Computer security in information technology -- Chapter 5. Definitions of network secure device -- Chapter 6. Mobility and network security -- Chapter 7. Networking and security issues -- Chapter 8. Wireless network communication and security -- Chapter 9. Risk management: the game of network security -- Chapter 10. Software and design and security
There are no comments for this item.