Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory.

chapter 1|17 pages


chapter 2|23 pages

Main Definitions

chapter 3|17 pages

Information Theory

chapter 4|13 pages

Source Coding

chapter 6|31 pages

Computer Networks

chapter 7|12 pages

Network Protocols and Architecture

chapter 8|23 pages

The TCP/IP Protocol

chapter 9|29 pages

Network Security

chapter 10|8 pages

Theoretical Cryptography

chapter 11|8 pages

The Hash Function

chapter 12|11 pages

Criminal Cases