Cryptography And Network Protection

About The Book

Cryptography is an essential technique that ensures the security of data in computer networks. The technique of transforming plaintext into incomprehensible text and vice versa is linked with cryptography. It is a technique for storing and transferring data in a specific format so that only the intended recipients can read and process it. In addition to protecting data from theft or modification, cryptography may also be used for user authentication. A computer network is the connectivity of many computer systems in the same location or in separate locations. The interconnection is accomplished via a communication link, also known as the physical layer of the network, which is completely transparent to the network's users. The interface software known as protocols lets a user in one area to freely access a computer system/database/process/software in another location, hence contributing to the transparency of the communication channel. Cryptography entails the idea, specification, and development of computing systems that solve security problems. The development of cryptographic systems must be founded on solid groundwork. Internet security poses significant difficulties and research possibilities. Serious security and privacy problems impede potential uses such as Internet voting, globally accessible medical information, and omnipresent e-commerce. The proliferation of hacker assaults on home PCs and websites just demonstrates the fundamental weakness of the present computer and network infrastructure. This book provides a thorough introduction to the function of cryptography in ensuring information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks.

ISBN 9781778806441
Author Mike Hamilton
Publisher OXMAN PRESS
Publication Year 2023
Category Computer Science & Information Technology
Price $158.00

Enquire Now

Name*

Email*

Phone No*

Message*

Mike Hamilton is a computer scientist with a Ph.D. He provided a unique contribution to comprehending the vast range of technical breakthroughs in computer networking and computer architecture. His research interests includes cryptography and network security, intrusion prevention, the advanced computer architectures, and the application of information technology to improve society (including the low-cost protocols for web-based elections). He teaches undergraduate and postgraduate students in Computer Engineering courses on Computer Networks, Information Security and Applications, and Public Key Infrastructure. He has advised government agencies, computer and software suppliers, and significant users on the design, selection, and usage of networking software and devices in his capacity as a consultant.