Amazon cover image
Image from Amazon.com

Cryptography and network security : principles and practice / William Stallings.

By: Material type: TextPublication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN:
  • 0131873164
Subject(s): LOC classification:
  • TK5105.59 .S713
Contents:
C.1 - Introduction pt.1- Symmetric ciphers. C.2 Classical encryption techniques -- C.3 Block ciphers and the data encryption standard -- C.4 Finite fields -- C.5 Advanced encryption standard -- C.6 More on symmetric ciphers -- C. Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. C.8 Introduction to number theory -- C.9 Public-key cryptography and RSA -- C.10 Key management: other public-key cryptosystems -- C.11 Message authentication and hash functions -- C.12 Hash and MAC algorithms -- C.13 Digital signatures and authentication protocols -- pt. 3: Network security applications. C.14 Authentication applications -- C.15 Electronic mail security -- C.16 IP security -- C.17 Web security -- pt. 4: System security. C.18 Intruders -- C.19 Malicious software -- C.20 Firewalls -
Tags from this library: No tags from this library for this title.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Cover image Item type Current library Home library Collection Shelving location Call number Materials specified Vol info URL Copy number Status Notes Date due Barcode Item holds Item hold queue priority Course reserves
Books Methodist University Library Main General Stacks Reference TK5105.59 .S713 (Browse shelf(Opens below)) Available 27910

Includes index

C.1 - Introduction
pt.1- Symmetric ciphers.
C.2 Classical encryption techniques --
C.3 Block ciphers and the data encryption standard --
C.4 Finite fields --
C.5 Advanced encryption standard --
C.6 More on symmetric ciphers --
C. Confidentiality using symmetric encryption --
pt. 2: Public-key encryption and hash functions.
C.8 Introduction to number theory --
C.9 Public-key cryptography and RSA --
C.10 Key management: other public-key cryptosystems --
C.11 Message authentication and hash functions --
C.12 Hash and MAC algorithms --
C.13 Digital signatures and authentication protocols --
pt. 3: Network security applications.
C.14 Authentication applications --
C.15 Electronic mail security --
C.16 IP security --
C.17 Web security --
pt. 4: System security.
C.18 Intruders --
C.19 Malicious software --
C.20 Firewalls -

There are no comments on this title.

to post a comment.
Share
Copyright © 2026  MUG Library