Introduction to cryptography and network security / Behrouz A. Forouzan.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- 0073327530 (set)
- 005.8 22
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Main library General Stacks | 005.8 / FO.C 2008 (Browse shelf(Opens below)) | 1 | Checked out | 03/14/2024 | 003938 |
Browsing Main library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 / DW.S 2006 Securing storage : | 005.8 / EL.U 2009 Understanding and applying cryptography and data security / | 005.8 / EN.I 2004 Intrusion detection & prevention / | 005.8 / FO.C 2008 Introduction to cryptography and network security / | 005.8 / FR.S 2009 Security monitoring / | 005.8 / FU.S 2008 Securing information and communications systems : | 005.8 / GE.P 2008 Build your own security lab : |
Includes bibliographical references (p. 707-708) and index.
Cryptography and Network Security -- Introduction -- Symmetric-Key Encipherment -- Mathematics of Cryptography -- Traditional Symmetric-Key Ciphers -- Mathematics of Cryptography -- Introduction to Modern Symmetric-Key Ciphers -- Data Encryption Standard (DES) -- Advanced Encryption Standard (AES) -- Encipherment Using Modern Symmetric-Key Ciphers -- Asymmetric-Key Encipherment -- Mathematics of Cryptography -- Asymmetric-Key Cryptography -- Integrity, Authentication, and Key Management -- Message Integrity and Message Authentication -- Cryptographic Hash Functions -- Digital Signature -- Entity Authentication -- Key Management -- Network Security -- Security at the Application Layer: PGP and S/MIME -- Security at the Transport Layer: SSL and TLS -- Security at the Network Layer: IPSec
A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.
1
There are no comments on this title.