ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cryptography and network security

دانلود کتاب رمزنگاری و امنیت شبکه

Cryptography and network security

مشخصات کتاب

Cryptography and network security

ویرایش:  
نویسندگان:   
سری: River Publishers series in security and digital forensics 
ISBN (شابک) : 9788770224062, 8770224064 
ناشر:  
سال نشر: 2022 
تعداد صفحات: [324] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 Mb 

قیمت کتاب (تومان) : 58,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Cryptography and network security به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب رمزنگاری و امنیت شبکه نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Front Cover
Cryptography and Network Security
Dedication
Contents
Preface
Acknowledgements
List of Figures
List of Tables
1 Introduction
	1.1 Information on the Network
	1.2 The Internet of Things
	1.3 Network Security
	1.4 Network Encryption
	1.5 Electronic Voting
	1.6 Security with Biometrics
	1.7 How to Understand Recognition
	1.8 Blockchain and Cryptocurrency
		1.8.1 Enterprises Can Profit from Blockchain
		1.8.2 The Cryptocurrency Frenzy
2 Main Definitions
	2.1 Criteria for a Security System
	2.2 Security Aspects to Consider
	2.3 Malicious Codes
		2.3.1 Virus
		2.3.2 Worms
		2.3.3 Robots
		2.3.4 Spy Programs
		2.3.5 Backdoor Program
		2.3.6 Trojan Horse
		2.3.7 Rootkit
	2.4 Internet Scams
		2.4.1 Identity Theft
		2.4.2 Resource Anticipation Fraud
		2.4.3 Phishing
		2.4.4 Pharming
		2.4.5 E-commerce Scams
		2.4.6 Hoax
	2.5 Internet Attacks
		2.5.1 Vulnerability Exploitation
		2.5.2 Network Scan
		2.5.3 Fake E-mail Address
		2.5.4 Traffic Interception
		2.5.5 Brute Force Attack
		2.5.6 Page Defacement
		2.5.7 Denial of Service
	2.6 Cryptography
		2.6.1 Symmetric Key and Asymmetric Key Cryptography
		2.6.2 Hash Function
		2.6.3 Digital Signature
		2.6.4 Digital Certificate
		2.6.5 Cryptography Programs
3 Information Theory
	3.1 Information Measurement
	3.2 Requirements for an Information Metric
	3.3 Source Coding
	3.4 Extension of a Memoryless Discrete Source
		3.4.1 Improving the Coding Efficiency
	3.5 Prefix Codes
	3.6 The Information Unit
4 Source Coding
	4.1 Types of Source Codes
		4.1.1 Block Codes
		4.1.2 Non-Singular Codes
		4.1.3 Uniquely Decodable Codes
		4.1.4 Instantaneous Codes
	4.2 Construction of Instantaneous Codes
	4.3 Kraft Inequality
	4.4 Huffman Code
		4.4.1 Constructing a Binary Huffman Code
5 Information Transmission and Channel Capacity
	5.1 The Concept of Information Theory
	5.2 Joint Information Measurement
	5.3 Conditional Entropy
	5.4 Model for a Communication Channel
	5.5 Noiseless Channel
	5.6 Channel with Independent Output and Input
	5.7 Relations Between the Entropies
	5.8 Mutual Information
	5.9 Channel Capacity
		5.9.1 Capacity of the Memoryless Discrete Channel
		5.9.2 Relative Redundancy and Efficiency
6 Computer Networks
	6.1 Data Flow in Networks
		6.1.1 Capacity of a Channel Composition
		6.1.2 Stationary Data Flow
	6.2 Queue Models
		6.2.1 Markov Model
		6.2.2 Solution for a Stable Network
		6.2.3 Constant Arrival Rate System
		6.2.4 Efficient Server Model
		6.2.5 Model with Discouraged Arrivals
		6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1
	6.3 Local Area Networks
		6.3.1 Definitions and Functions
		6.3.2 Applications for Local Area Networks
		6.3.3 Network Structure and Topology
		6.3.4 Channel Access Techniques
		6.3.5 Traffic on the Network
		6.3.6 Performance Measures
7 Network Protocols and Architecture
	7.1 What the World Was Like Without the Internet
	7.2 Layer Architecture
		7.2.1 The ISO Reference Model
		7.2.2 Reference Model layers
		7.2.3 IEEE 802 Standards for Computer Networks
8 The TCP/IP Protocol
	8.1 TCP/IP Protocol History
	8.2 Internet Coordination
	8.3 Types of Networks
	8.4 Transmission Protocols
	8.5 Interconnection Equipment
	8.6 Interconnection Protocols
		8.6.1 Other TCP Services
		8.6.2 TCP Header Structure
	8.7 The IP Protocol
		8.7.1 IP Addresses
		8.7.2 Example of a DNS
		8.7.3 Datagram Fragmentation
		8.7.4 IP Routing
		8.7.5 IP Address Resolution
		8.7.6 User Datagram Protocol
		8.7.7 Applications that Use TCP and UDP
		8.7.8 Applications that Use TCP and UDP
	8.8 The TCP/IP Protocol
		8.8.1 Application Layer
		8.8.2 Transport Layer
		8.8.3 Internet Layer
	8.9 Security Protocols for TCP/IP
		8.9.1 IP Security Protocol
		8.9.2 Vulnerabilities and Precautions Regarding TCP/IP
		8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services
9 Network Security
	9.1 Cryptography Applied to Computer Networks
		9.1.1 Potential Network Vulnerabilities
		9.1.2 Listening, Data Change, Forged Identity
		9.1.3 Password-Based Attacks
		9.1.4 Denial of Service
		9.1.5 Password Break Attack
		9.1.6 Sniffer Attack
		9.1.7 Attack to the Application Layer
	9.2 Alternatives to Prevent Attacks
		9.2.1 Security Technologies
		9.2.2 Security Mechanisms for the Application Layer
		9.2.3 Security Mechanisms for the Transport Layer
		9.2.4 Security Mechanisms for the Network Layer
	9.3 Secure Sockets Layer Protocol
		9.3.1 Encryption Used with SSL
	9.4 Exchange of Information for the Safe Sockets Layer
		9.4.1 Server Authentication
		9.4.2 Attack of the Man in the Middle
		9.4.3 Client Authentication
	9.5 Data Protection with IPsec
		9.5.1 Security Associations
		9.5.2 Tunneling
		9.5.3 Authentication Header
		9.5.4 Authentication Header Format
		9.5.5 Authentication Header in Transport and Tunnel Modes
		9.5.6 AH in Tunnel Mode
	9.6 Encapsulated Security Load
		9.6.1 ESP Package Format
		9.6.2 ESP in Transport Mode
		9.6.3 ESP in Tunnel Mode
	9.7 Espionage Between Countries
10 Theoretical Cryptography
	10.1 Introduction
	10.2 Cryptographic Aspects of Computer Networks
		10.2.1 Potential Vulnerabilities of Computer Networks
	10.3 Principles of Cryptography
	10.4 Information Theoretical Aspects of Cryptography
		10.4.1 Relations Between the Entropies
	10.5 Mutual Information for Cryptosystems
11 The Hash Function
	11.1 Introduction to Network Security
	11.2 Hash Functions
	11.3 Objectives of the Hash Function
	11.4 Mathematical Preliminaries
	11.5 Privacy Amplification
	11.6 Conclusion
12 Criminal Cases
	12.1 Introduction to Cybercrimes
	12.2 Types of Cybercrimes
	12.3 Famous Cybercrimes
		12.3.1 The Mythical Pegasus
		12.3.2 Hackers' Attack to Colonial and JBS
		12.3.3 The Biggest Ransomware Attack Ever
		12.3.4 Credit Cards Data Stolen from Home Depot's System
		12.3.5 Largest Theft of Customer Data
		12.3.6 Yahoo Data Breach
		12.3.7 Customer's Data Stolen from Healthcare Companies
		12.3.8 Social Security Numbers Stolen from IRS
		12.3.9 Government Data Breach Due to Outdated Technology
		12.3.10 Google Corporate Servers Hacked in China
		12.3.11 Sony Pictures Hacked
		12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee
		12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix
		12.3.14 MafiaBoy's Teenage Crimes
		12.3.15 Epsilon Attacked by Hackers
		12.3.16 NHS Patients Had Their Computers Infected
		12.3.17 When the United States Department of Defense was Attacked
		12.3.18 The Ashley Madison Hack
		12.3.19 The Stuxnet Worm Attack
		12.3.20 The Iceman Attack
		12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong
		12.3.22 Crypto Exchange Bithumb Hacked
		12.3.23 Espionage Between Partners
Appendix A Probability Theory
	A.1 Set Theory and Measure
		A.1.1 Basic Set Theory
		A.1.2 Some Operations on Sets
		A.1.3 Families of Sets
		A.1.4 Indexing of Sets
		A.1.5 An Algebra of Sets
		A.1.6 The Borel Algebra
	A.2 Basic Probability Theory
		A.2.1 The Axioms of Probability
		A.2.2 Bayes' Rule
	A.3 Random Variables
		A.3.1 Expected Value of a Random Variable
		A.3.2 Moments of a Random Variable
		A.3.3 Variance of a Random Variable
		A.3.4 Characteristic Function
			A.3.4.1 Two Important Distributions
		A.3.5 Joint Random Variables
Appendix B Cryptoalgorithms and Cryptosystems
Appendix C Glossary of Information Security Terms
References
Index
About the Author
Back Cover




نظرات کاربران