Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Cryptography and network security : principles and practice / William Stallings.

By: Material type: TextTextPublisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, [2006]Copyright date: ©2006Edition: fourth editionDescription: xvi, 680 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0131873164
  • 0132023229
  • 9780132023221
Subject(s): DDC classification:
  • 21 005.8 S.W.C
Online resources:
Contents:
Symmetric ciphers: Classical encryption techniques; Block ciphers and the data encryption standard; Finite fields; Advanced encryption standard; More on symmetric ciphers; Confidentiality using symmetric encryption -- Public-key encryption and hash functions: Introduction to number theory; Public-key cryptography and RSA; Key management, other public-key cryptosystems; Message authentication and hash functions; Hash and MAC algorithms; Digital signatures and authentication protocols -- Network security applications: Authentication applications; Electronic mail security; IP security; Web security -- System security: Intruders; Malicious software; Firewalls -- Appendices: Standards and standards-setting organizations; Projects for teaching cryptography and network security -- Glossary.
Star ratings
    Average rating: 0.0 (0 votes)

Includes bibliographical references (p. 663-672) and index.

Symmetric ciphers: Classical encryption techniques; Block ciphers and the data encryption standard; Finite fields; Advanced encryption standard; More on symmetric ciphers; Confidentiality using symmetric encryption --
Public-key encryption and hash functions: Introduction to number theory; Public-key cryptography and RSA; Key management, other public-key cryptosystems; Message authentication and hash functions; Hash and MAC algorithms; Digital signatures and authentication protocols --
Network security applications: Authentication applications; Electronic mail security; IP security; Web security --
System security: Intruders; Malicious software; Firewalls --
Appendices: Standards and standards-setting organizations; Projects for teaching cryptography and network security --
Glossary.

There are no comments on this title.

to post a comment.