Cryptography and Network Security
Pearson (Verlag)
978-0-13-187316-2 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.
As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today.
Visit Stallings Companion Website at http://williamstallings.com/Crypto/Crypto4e.html for student and instructor resources and his Computer Science Student Resource site http://williamstallings.com/StudentSupport.html
Password protected instructor resources can be accessed here by clicking on the Resources Tab to view downloadable files. (Registration required)
Supplements Include: Solutions, Power Point slides. Projects, Encryption Lab Exercises.
NOTATION
PREFACE
CHAPTER 0 READER'S GUIDE
CHAPTER 1 OVERVIEW
PART ONE SYMMETRIC CIPHERS
CHAPTER 2 CLASSICAL ENCRYPTION TECHNIQUES
CHAPTER 3 BLOCK CIPHERS AND THE DATA ENCRYPTION STANDARD
CHAPTER 4 INTRODUCTION TO FINITE FIELDS
CHAPTER 5 ADVANCED ENCRYPTION STANDARD
CHAPTER 6 MORE ON SYMMETRIC CIPHERS
CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION
PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS
CHAPTER 8 INTRODUCTION TO NUMBER THEORY
CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA
CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS
CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS
1
CHAPTER 12 HASH AND MAC ALGORITHMS
CHAPTER 13 DIGITAL SIGNATURES AND AUTHENTICATION PROTOCOLS
PART THREE NETWORK SECURITY PRACTICE
CHAPTER 14 AUTHENTICATION APPLICATIONS
CHAPTER 15 ELECTRONIC MAIL SECURITY
CHAPTER 16 IP SECURITY
CHAPTER 17 WEB SECURITY
PART FOUR SYSTEM SECURITY
CHAPTER 18 INTRUDERS
CHAPTER 19 MALICIOUS SOFTWARE
CHAPTER 20 FIREWALLS
APPENDICES
APPENDIX A STANDARDS AND STANDARD-SETTING ORGANIZATIONS
APPENDIX B PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK SECURITY
ONLINE APPENDICES
APPENDIX C SIMPLIFIED DES
APPENDIX D THE MEANING OF mod
APPENDIX E MORE ON SIMPLIFIED AES
APPENDIX F KNAPSACK PUBLIC-KEY ALGORITHM
APPENDIX G PROOF OF THE DIGITAL SIGNATURE ALGORITHM
GLOSSARY
REFERENCES
INDEX
LIST OF ACRONYMS
Erscheint lt. Verlag | 1.2.2006 |
---|---|
Sprache | englisch |
Maße | 179 x 250 mm |
Gewicht | 1174 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 0-13-187316-4 / 0131873164 |
ISBN-13 | 978-0-13-187316-2 / 9780131873162 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich