menu
{ "item_title" : "A user guide on cryptographic programs", "item_author" : [" S. V. Divya", "P. Venkadesh "], "item_description" : "This book provides a comprehensive introduction to various cryptographic techniques and cybersecurity concepts. It covers classical ciphers like Caesar, Playfair, Hill, Vigenère, and Rail Fence, which are foundational in understanding the basics of encryption. It then focus into more advanced cryptographic algorithms, such as the Data Encryption Standard, RSA Algorithm, and the Diffie-Hellman Key Exchange, which are crucial for modern secure communications. Additionally, the book explores hashing algorithms like MD5 and SHA, which are vital for data integrity, and discusses the importance of digital signatures for authentication. Finally, it touches on rootkits, a type of malware that allows unauthorized access to computer systems, highlighting the challenges in modern cybersecurity.", "item_img_path" : "https://covers1.booksamillion.com/covers/bam/6/20/806/480/6208064805_b.jpg", "price_data" : { "retail_price" : "49.00", "online_price" : "49.00", "our_price" : "49.00", "club_price" : "49.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
A user guide on cryptographic programs|S. V. Divya

A user guide on cryptographic programs

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book provides a comprehensive introduction to various cryptographic techniques and cybersecurity concepts. It covers classical ciphers like Caesar, Playfair, Hill, Vigenère, and Rail Fence, which are foundational in understanding the basics of encryption. It then focus into more advanced cryptographic algorithms, such as the Data Encryption Standard, RSA Algorithm, and the Diffie-Hellman Key Exchange, which are crucial for modern secure communications. Additionally, the book explores hashing algorithms like MD5 and SHA, which are vital for data integrity, and discusses the importance of digital signatures for authentication. Finally, it touches on rootkits, a type of malware that allows unauthorized access to computer systems, highlighting the challenges in modern cybersecurity.

This item is Non-Returnable

Details

  • ISBN-13: 9786208064808
  • ISBN-10: 6208064805
  • Publisher: LAP Lambert Academic Publishing
  • Publish Date: September 2024
  • Dimensions: 9 x 6 x 0.21 inches
  • Shipping Weight: 0.31 pounds
  • Page Count: 88

Related Categories

You May Also Like...

    1

BAM Customer Reviews