Cryptography and network security : principles and practice / William Stallings.
Material type:
TextPublication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006.Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN: - 0131873164
- TK5105.59 .S713
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
Methodist University Library Main General Stacks | Reference | TK5105.59 .S713 (Browse shelf(Opens below)) | Available | 27910 |
Browsing Methodist University Library Main shelves,Shelving location: General Stacks,Collection: Reference Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| TK5105.59 .N36 Nessus network auditing | TK5105.59 .N36 Nessus network auditing | TK5105.59 .P36 Novell's BorderManager administrator's handbook / | TK5105.59 .S713 Cryptography and network security : | TK5105.59 .Sh1 Hacking Web services | TK5105.59 .W58 Guide to firewalls and network security: | TK5105.59 .W58 Guide to firewalls and network security: |
Includes index
C.1 - Introduction
pt.1- Symmetric ciphers.
C.2 Classical encryption techniques --
C.3 Block ciphers and the data encryption standard --
C.4 Finite fields --
C.5 Advanced encryption standard --
C.6 More on symmetric ciphers --
C. Confidentiality using symmetric encryption --
pt. 2: Public-key encryption and hash functions.
C.8 Introduction to number theory --
C.9 Public-key cryptography and RSA --
C.10 Key management: other public-key cryptosystems --
C.11 Message authentication and hash functions --
C.12 Hash and MAC algorithms --
C.13 Digital signatures and authentication protocols --
pt. 3: Network security applications.
C.14 Authentication applications --
C.15 Electronic mail security --
C.16 IP security --
C.17 Web security --
pt. 4: System security.
C.18 Intruders --
C.19 Malicious software --
C.20 Firewalls -
There are no comments on this title.