Cryptography and network security : principles and practice. / William Stallings.

By: Stallings, WilliamMaterial type: TextTextPublisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN: 0131873164Subject(s): Computer networks -- Security measures | Data encryption (Computer science) | Coding theory | Computer securityLOC classification: TK5105.59.S713 Online resources: Table of contents only
Contents:
Contents: Reader's guides -- Introduction -- Classical encryption techniques --Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- Introduction to number of theory -- Public-key cryptography and RSA -- Key management; other public-key cryptosystems --Message authentication and hash function -- Hash and MAC algorithms -- Digital signature and authentication protocols -- Authentication applications -- Electronic mail security -- IP security -- Web security -- Intruders -- Malicious software --Firewalls - Appendices.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Copy number Status Date due Barcode
Books Books WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY
General Stacks
WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY
TK5105.59.S713 (Browse shelf) 1 Available 5797/12

Includes bibliographical references (p. 663-672) and index.

Contents: Reader's guides -- Introduction -- Classical encryption techniques --Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- Introduction to number of theory -- Public-key cryptography and RSA -- Key management; other public-key cryptosystems --Message authentication and hash function -- Hash and MAC algorithms -- Digital signature and authentication protocols -- Authentication applications -- Electronic mail security -- IP security -- Web security -- Intruders -- Malicious software --Firewalls - Appendices.

There are no comments on this title.

to post a comment.

If you have any concerns or questions; kindly contact the library


© Powered by WIUC IT - Support Services Unit