In-depth analysis of technical issues involved in security management, risk management and security and law is presented. Smart card, biometrics, virtual private networks, trusted operating systems, pretty good privacy, database security, and intrusion detection systems are comprehensively covered. Encryption methods, secret key and public key cryptography, digital signature and other security mechanisms are emphasized. Students are first exposed to network security principles, organizational policy and security infrastructure, and then drawn into some of the deeper issues of cryptographic algorithms and protocols underlying network security applications. It is designed for a one-semester course for undergraduate students of Computer Science, Information Technology, and undergraduate and postgraduate students of Computer Applications.
0 Comments
Leave a Reply. |