Best Reference Books – Secure Communications

«
»
We have compiled the list of Top 10 Best Reference Books on Secure Communications subject. These books are used by students of top universities, institutes and colleges. Here is the full list of top 10 best books on Secure Communications along with reviews.

Kindly note that we have put a lot of effort into researching the best books on Secure Communications subject and came out with a recommended list of top 10 best books. The table below contains the Name of these best books, their authors, publishers and an unbiased review of books on "Secure Communications" as well as links to the Amazon website to directly purchase these books. As an Amazon Associate, we earn from qualifying purchases, but this does not impact our reviews, comparisons, and listing of these top books; the table serves as a ready reckoner list of these best books.

1. “A Hybrid Zone-Based Routing Protocol for Secure Communication in Manet” by Niroj Kumar Pani and Ashok Kumar Turuk

“A Hybrid Zone-Based Routing Protocol for Secure Communication in Manet” Book Review: The book details the design of the secure zone routing protocol and analyses its robustness in the presence of multiple possible security attacks. It also discusses the attacks that involve impersonation, modification, fabrication and replay of packets caused either by an external advisory or an internal compromised node within the network. It lists properties of both proactive and reactive approaches.

2. “Secure Communication Using Rossler Attractor” by Farrukh Atif

advertisement
“Secure Communication Using Rossler Attractor” Book Review: The book discusses different communication methods to send sensitive information in different forms like wireless, fiber optics or even telephone. It lists results of experiments implemented on DSP, FPGA and on analog Op-Amps. The book uses a Rossler based chaotic equation to show how to transfer information wirelessly or fiber optics or any other means.

3. “Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)” by Jiannong Cao and Chisheng Zhang

“Seamless and Secure Communications over Heterogeneous Wireless Networks (SpringerBriefs in Computer Science)” Book Review: This book provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It also covers the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. It also lists challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. Book for the professionals and researchers in the communication field and advanced-level students in computer communication networks and wireless technologies.

4. “Advanced Penetration Testing: Hacking the World′s Most Secure Networks” by Wil Allsopp

advertisement
advertisement
“Advanced Penetration Testing: Hacking the World′s Most Secure Networks” Book Review: Book shows how to defend high security networks, use targeted social engineering pretexts to create the initial compromise and leave a command and control structure in place for long-term access. It also escalates privilege and breach networks, operating systems, and trust structures. It also describes how to harden IT infrastructure and human capital against targeted advanced attacks from motivated professionals. It also covers advanced pen testing for high security networks.

5. “Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems (SpringerBriefs in Electrical and Computer Engineering)” by Y W Peter Hong and Pang-Chang Lan

“Signal Processing Approaches to Secure Physical Layer Communications in Multi-Antenna Wireless Systems (SpringerBriefs in Electrical and Computer Engineering)” Book Review: This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. It focuses on the signal processing aspects, including beamforming and precoding techniques for data transmission and discriminatory training schemes for channel estimation. Book for researchers in the signal processing community as well to practitioners and engineers working in this area. It also reviews recent works that apply these signal processing approaches to more advanced wireless systems, such as OFDM systems, multicell systems, cognitive radio, multihop networks etc. It also lists works on physical layer secrecy, knowledge of how signal processing techniques can be applied to this area, and the application of these techniques in advanced wireless applications.

6. “Secure Manet Communication Based on Hybrid Cryptosystem” by Amin Noor Ul

advertisement
“Secure Manet Communication Based on Hybrid Cryptosystem” Book Review: This book has design and development of security-aware and performance efficient routing protocols for mobile ad hoc networks is an active area of ​​research. It covers work of security extension of AODV and new routing protocol for MANET- SCAODV-adding security field which enable the protocol to run in sixteen different modes according to the security desired. It also lists proposed protocols for the properties of resistance to spoofed routing and secure key exchange with confidentiality, integrity, authenticity, non repudiation and verifiability

7. “Ultra-Secure Protection for Data Communication” by Wazen Shbair

“Ultra-Secure Protection for Data Communication” Book Review: The book lists deployment of many network applications such as command and control military communication, email, web browsing, e-voting and e-shopping. It provides a new anonymity mechanism to help hiding user activity over the network. It also covers synthesized dummy traffic generator (S-DTG), which is able to synthesize dummy traffic based on samples from real traffic and send it when users are not sending traffic over the network.

8. “Enabling Secure and Privacy Preserving Communications in Smart Grids (SpringerBriefs in Computer Science)” by Hongwei Li

advertisement
“Enabling Secure and Privacy Preserving Communications in Smart Grids (SpringerBriefs in Computer Science)” Book Review: The book focuses on the current research on security and privacy preservation in smart grids. It also lists reviews of the existing works. It includes fundamental system models, possible frameworks, useful performance and future research directions. It explores privacy preservation demand response with adaptive key evolution, secure and efficient merkle tree based authentication and fine-grained keywords comparison in the smart grid auction market. Book for researchers and professionals working with computer communication networks and smart grids.

9. “A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets” by Victor P Hubenko

“A Secure and Efficient Communications Architecture for Global Information Grid Users Via Cooperating Space Assets” Book Review: The book provides real-time applications and collaboration of global, seamless, ubiquitous, secure and efficient communications. It also provides end users with maximum situational awareness, a comprehensive view of the battlespace, all within a secure networking environment.

10. “Principles of Secure Communication Systems (Telecommunications Library)” by Don Torrieri

advertisement
“Principles of Secure Communication Systems (Telecommunications Library)” Book Review: The book provides the latest techniques with a view towards practical applications. It also has an analytical study of communication theory and other disciplines that have special relevance to secure communication systems and concentrates on principles, concepts and systems-level analyses.

People who are searching for Free downloads of books and free pdf copies of these top 10 books on Secure Communications – we would like to mention that we don’t have free downloadable pdf copies of these good books and one should look for free pdf copies from these Authors only if they have explicitly made it free to download and read them.

We have created a collection of best reference books on "Secure Communications" so that one can readily see the list of top books on "Secure Communications" and buy the books either online or offline.

If any more book needs to be added to the list of best books on Secure Communications subject, please let us know.

Sanfoundry Global Education & Learning Series – Best Reference Books!

Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!
advertisement
advertisement
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He is Linux Kernel Developer & SAN Architect and is passionate about competency developments in these areas. He lives in Bangalore and delivers focused training sessions to IT professionals in Linux Kernel, Linux Debugging, Linux Device Drivers, Linux Networking, Linux Storage, Advanced C Programming, SAN Storage Technologies, SCSI Internals & Storage Protocols such as iSCSI & Fiber Channel. Stay connected with him @ LinkedIn | Youtube | Instagram | Facebook | Twitter