Cryptography and network security : principles and practices / William Stallings
Material type:
- text
- unmediated
- volume
- 0131873164
- 9780131873162
- 0132023229
- 9780132023221
- 005.8 22
- TK5105.59 .S713 2006
Item type | Current library | Collection | Shelving location | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
![]() |
Dato Maznah Library & Information Services | Open Collection | TK Electrical engineering. Electronics. Nuclear engineering | TK5105.59.S713 2006 (Browse shelf(Opens below)) | Available | 10082035 |
Browsing Dato Maznah Library & Information Services shelves, Shelving location: TK Electrical engineering. Electronics. Nuclear engineering, Collection: Open Collection Close shelf browser (Hides shelf browser)
TK5105.59 .A39 1996 Network and Internet security / | TK5105.59 .F672 2008 Introduction to cryptography and network security / | TK5105.59 .S49 2002 Internet security made easy : a plain-English guide to protecting yourself and your company online / | TK5105.59.S713 2006 Cryptography and network security : principles and practices / | TK5105.59 .S713 2011 Cryptography and network security : principles and practice / | TK5105.59.W54 2009 Principles of information security / | TK5105.7 .M333 1994 Local area networks : new technologies, emerging standards / |
Includes bibliographical references (pages 663-672) and index
pt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists
There are no comments on this title.