Cryptography and network security : principles and practice / William Stallings.
Material type:
TextPublication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN: - 9780132023221
- 0132023229
- 005.12 22
| Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Main library General Stacks | 005.12 / ST.C 2006 (Browse shelf(Opens below)) | 1 | Available | 000281 | ||
Books
|
Main library General Stacks | 005.12 / ST.C 2006 (Browse shelf(Opens below)) | 2 | Available | 001884 | ||
Books
|
Main library General Stacks | 005.12 / ST.C 2006 (Browse shelf(Opens below)) | 3 | Available | 003305 | ||
Books
|
Main library General Stacks | 005.12 / ST.C 2006 (Browse shelf(Opens below)) | 4 | Available | 003302 | ||
Books
|
Main library General Stacks | 005.12 / ST.C 2006 (Browse shelf(Opens below)) | 5 | Available | 003301 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.12 / QI.S 2010 Software architecture and design illuminated / | 005.12 / RO.S 1998 Software project management : | 005.12 / SO.I 2009 Information storage and management : | 005.12 / ST.C 2006 Cryptography and network security : | 005.12 / ST.C 2006 Cryptography and network security : | 005.12 / ST.C 2006 Cryptography and network security : | 005.12 / ST.C 2006 Cryptography and network security : |
Includes bibliographical references (p. 663-672) and index.
Chapter 1 overview -- chapter 2 classical encryption techniques -- chapter 3 block ciphers and the data encryption standard -- chapter 4 introduction to finite fields -- chapter 5 advanced encryption standard -- chapter 6 more on symmetric ciphers -- chapter 7 confidentiality using symmetric encryption -- part two public-key encryption and hash functions -- chapter 8 introduction to number theory -- chapter 9 public-key cryptography and rsa -- chapter 10 key management; other public-key cryptosystems -- chapter 11 message authentication and hash functions -- chapter 12 hash and mac algorithms -- chapter 13 digital signatures and authentication protocols -- chapter 14 authentication applications -- chapter 15 electronic mail security -- chapter 16 ip security -- chapter 17 web security -- chapter 18 intruders -- chapter 19 malicious software -- chapter 20 firewalls.
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.
1
There are no comments on this title.