Amazon cover image
Image from Amazon.com
Image from Google Jackets

Cryptography and network security : principles and practice / William Stallings.

By: Material type: TextTextPublication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN:
  • 9780132023221
  • 0132023229
Subject(s): DDC classification:
  • 005.12   22
Contents:
Chapter 1 overview -- chapter 2 classical encryption techniques -- chapter 3 block ciphers and the data encryption standard -- chapter 4 introduction to finite fields -- chapter 5 advanced encryption standard -- chapter 6 more on symmetric ciphers -- chapter 7 confidentiality using symmetric encryption -- part two public-key encryption and hash functions -- chapter 8 introduction to number theory -- chapter 9 public-key cryptography and rsa -- chapter 10 key management; other public-key cryptosystems -- chapter 11 message authentication and hash functions -- chapter 12 hash and mac algorithms -- chapter 13 digital signatures and authentication protocols -- chapter 14 authentication applications -- chapter 15 electronic mail security -- chapter 16 ip security -- chapter 17 web security -- chapter 18 intruders -- chapter 19 malicious software -- chapter 20 firewalls.
Summary: In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Books Books Main library General Stacks 005.12 / ST.C 2006 (Browse shelf(Opens below)) 1 Available 000281
Books Books Main library General Stacks 005.12 / ST.C 2006 (Browse shelf(Opens below)) 2 Available 001884
Books Books Main library General Stacks 005.12 / ST.C 2006 (Browse shelf(Opens below)) 3 Available 003305
Books Books Main library General Stacks 005.12 / ST.C 2006 (Browse shelf(Opens below)) 4 Available 003302
Books Books Main library General Stacks 005.12 / ST.C 2006 (Browse shelf(Opens below)) 5 Available 003301

Includes bibliographical references (p. 663-672) and index.

Chapter 1 overview -- chapter 2 classical encryption techniques -- chapter 3 block ciphers and the data encryption standard -- chapter 4 introduction to finite fields -- chapter 5 advanced encryption standard -- chapter 6 more on symmetric ciphers -- chapter 7 confidentiality using symmetric encryption -- part two public-key encryption and hash functions -- chapter 8 introduction to number theory -- chapter 9 public-key cryptography and rsa -- chapter 10 key management; other public-key cryptosystems -- chapter 11 message authentication and hash functions -- chapter 12 hash and mac algorithms -- chapter 13 digital signatures and authentication protocols -- chapter 14 authentication applications -- chapter 15 electronic mail security -- chapter 16 ip security -- chapter 17 web security -- chapter 18 intruders -- chapter 19 malicious software -- chapter 20 firewalls.

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.

1

There are no comments on this title.

to post a comment.