Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
71Activity
0 of .
Results for:
No results containing your search query
P. 1
Cryptography and Network Security - Chap 1

Cryptography and Network Security - Chap 1

Ratings:

4.75

(4)
|Views: 10,904|Likes:
Published by api-3737433
Network Security Notes
Network Security Notes

More info:

Published by: api-3737433 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PPS, PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

Cryptography and
Cryptography and
Network Security
Network Security
Chapter 1
Chapter 1
Fourth Edition
Fourth Edition
by William Stallings
by William Stallings
Lecture slides by Lawrie Brown
Lecture slides by Lawrie Brown
Chapter 1 \u2013 Introduction
Chapter 1 \u2013 Introduction
The art of war teaches us to rely not on the
The art of war teaches us to rely not on the
likelihood of the enemy's not coming, but
likelihood of the enemy's not coming, but
on our own readiness to receive him; not
on our own readiness to receive him; not
on the chance of his not attacking, but
on the chance of his not attacking, but
rather on the fact that we have made our
rather on the fact that we have made our
position unassailable.
position unassailable.
\u2014
\u2014The Art of War,
The Art of War, Sun Tzu
Sun Tzu
Background
Background
\ue000Information Security requirements have changed
Information Security requirements have changed
in recent times
in recent times
\ue000traditionally provided by physical and
traditionally provided by physical and
administrative mechanisms
administrative mechanisms
\ue000computer use requires
computer use requires automated tools to
automated tools to
protect files and other stored information
protect files and other stored information
\ue000use of networks and communications links
use of networks and communications links
requires measures to protect data during
requires measures to protect data during
transmission
transmission

Activity (71)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Anu Disney liked this
Vishnu Prakash liked this
Divya Harshini liked this
rajesh patel liked this
ramsul143 liked this
Revathi Krishnan liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->