blogger counter | dedicated server |
Here I would try to help those CSE students of WBUT,Kolkata who are preparing for their 8th semester Network Security paper which is an elective and obviously one of the most interesting subjects for CSE students.
Here I would recommend 3 books if you wish to study Network Security in accordance with the prescribed WBUT syllabus:
1.Network Security Essentials :William Stallings 4th Edition <WBUT Syllabus is set according to the contents of this book but this text book is not for beginners >
2.Cryptography and Network Security :Atul Kahate Second Edition <Best book for beginners and I would recommend every student to thoroughly go through the chapters in accordance with the WBUT syllabus>
3. Cryptography and Network Security:Behrouz A. Forouzan Tata McGraw Hill<Special Indian Edition 2007>
Now I would give you a comprehensive study guide regarding the topics from the WBUT syllabus and the corresponding books from which you can study them for your exam purposes.
1.Module 1:Introduction [3]
Attacks, Services, Mechanisms, Security Attacks, Security Services, Model for Network SecurityThese topics are explained lucidly in Forouzan Chapter 1.1,1.2,1.3,1.4 and William Stallings Chapter 1.6.Read them in detail and the first module of your syllabus is over.
2.Module 2:Conventional Encryption and Message Confidentiality [8]
Conventional Encryption Principles, Conventional Encryption Algorithms, Location of Encryption Devices, Key Distribution.
Read from Atul Kahate
chapter 2.1,2.2,2.3(2.3.1,2.3.2,2.3.3,2.3.4,2.3.5,2.3.6,2.3.7,2.3.8),2.4(2.4.1,2.4.2,2.4.3,2.4.4),2.5,2.6(2.6.1,2.6.2),2.7,2.8,2.9
Module 3:Public Key Cryptography and Message Authentication [8]
Approaches to Message Authentication, SHA-1, MD5, Public-Key Cryptography Principles, RSA, Digital Signatures, Key Management
Read from Atul Kahatechapter 3.2(3.2.1,3.2.2),3.3,3.4(3.4.1,3.4.2,3.4.3),4(4.2,4.3,4.4.1,4.4.2,4.4.3,4.5.1,4.5.2,4.6.1,4.6.2,4.6.3,4.6.4)
Network Security Applications [4]
Kerberos Motivation, Kerberos Version 4, PGP Notation, PGP Operational DescriptionRead from Atul Kahate
chapter
6.11.3,7.7(7.7.2,7.7.3)
TO BE CONTINUED...
Regards Anirban Basu
8017204158
TO BE CONTINUED...
Regards Anirban Basu
8017204158
Thanks for sharing this is such a very nice post i really like it your blog.
ReplyDeleteNetwork Security