Cryptography and network security : principles and practice / William Stallings
Material type: TextPublisher: Boston : Pearson, [2017]Edition: Seventh editionDescription: xviii, 748 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780273793359
- 0134444280
- 005.8
- TK5105.59 .S713 2017
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
Books | Centeral Library Second Floor - Computer Sciences | 005.8 S.W.C 2014 (Browse shelf(Opens below)) | Available | 22298 | ||
Books | Centeral Library Second Floor - Computer Sciences | 005.8 S.W.C 2014 (Browse shelf(Opens below)) | Available | 21985 | ||
Books | Centeral Library Second Floor - Computer Sciences | 005.8 S.W.C 2014 (Browse shelf(Opens below)) | Available | 21986 | ||
Books | Centeral Library Second Floor - Computer Sciences | 005.8 S.W.C 2014 (Browse shelf(Opens below)) | Available | 22297 | ||
Books | Centeral Library Second Floor - Computer Sciences | 005.8 S.W.C 2014 (Browse shelf(Opens below)) | Available | 21984 |
Browsing Centeral Library shelves, Shelving location: Second Floor - Computer Sciences Close shelf browser (Hides shelf browser)
005.8 S.W.C 2006 Cryptography and network security : | 005.8 S.W.C 2006 Cryptography and network security : | 005.8 S.W.C 2014 Cryptography and network security : | 005.8 S.W.C 2014 Cryptography and network security : | 005.8 S.W.C 2014 Cryptography and network security : | 005.8 S.W.C 2014 Cryptography and network security : | 005.8 S.W.C 2014 Cryptography and network security : |
Includes bibliographical references and index
Part One: Background -- Computer and Network Security Concepts -- Introduction to Number Theory -- Part Two: Symmetric Ciphers -- Classical Encryption Techniques -- Block Ciphers and the Data Encryption Standard -- Finite Fields -- Advanced Encryption Standard -- Block Cipher Operation -- Random Bit Generation and Stream Ciphers -- Part Three: Asymmetric Ciphers -- Public-Key Cryptography and RSA -- Other Public-Key Cryptosystems -- Part Four: Cryptographic Data Integrity Algorithms -- Cryptographic Hash Functions -- Message Authentication Codes -- Digital Signatures -- Part Five: Mutual Trust -- Key Management and Distribution -- User Authentication -- Part Six: Network and Internet Security -- Network Access Control and Cloud Security -- Transport-Level Security -- Wireless Network Security -- Electronic Mail Security -- IP Security -- Appendicies -- Appendix A: Projects for Teaching Cryptography and Network Security -- Appendix B: Sage Examples
There are no comments on this title.