skip to content
Cryptography and network security : principles and practice Preview this item
ClosePreview this item
Checking...

Cryptography and network security : principles and practice

Author: William Stallings
Publisher: Boston : Prentice Hall, ©2011.
Edition/Format:   Book : English : 5th edView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: William Stallings
ISBN: 9780136097044 0136097049
OCLC Number: 465363878
Description: xxiii, 719 p. : ill. ; 24 cm
Contents: 1. Overview --
Part One: Symmetric ciphers --
2. Classical encryption techniques --
3. Block ciphers and the data encryption standard --
4. Basic concepts in number theory and finite fields --
5. Advanced encryption standard --
6. Block cipher operation --
7. Pseudorandom number generation and stream ciphers --
Part Two: Asymmetric ciphers --
8. More number theory --
9. Public-key cryptography and RSA --
10. Other public-key cryptosystems --
Part Three: Cryptographic data integrity algorithms --
11. Cryptographic hash functions --
12. Message authentication codes --
13. Digital signatures --
Part Four: Mutual trust --
14. Key management and distribution --
15. User authentication protocols --
Part Five: Network and internet security --
16. Transport-level security --
17. Wireless network security --
18. Electronic mail security --
19. IP security --
Appendix A: Projects for teaching cryptography and network security --
Appendix B: Sage examples --
Online chapters --
Part Six: System security --
20. Intruders --
21. Malicious software --
22. Firewalls --
Part Seven: Legal and ethical issues --
23. Legal and ethical issues.
Responsibility: William Stallings.

Reviews

Editorial reviews

Publisher Synopsis

"Coverage and clarity of material are excellent in this book [Stallings]. This is an appropriate level for first-year graduate students." -- Shambhu Upadhyaya, University at Buffalo "Bill Stallings Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (3)

View most popular tags as: tag list | tag cloud

Similar Items

Related Subjects:(4)

User lists with this item (7)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/465363878>
library:oclcnum"465363878"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/465363878>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:about
schema:about
schema:bookEdition"5th ed."
schema:copyrightYear"2011"
schema:creator
schema:datePublished"2011"
schema:description"1. Overview -- Part One: Symmetric ciphers -- 2. Classical encryption techniques -- 3. Block ciphers and the data encryption standard -- 4. Basic concepts in number theory and finite fields -- 5. Advanced encryption standard -- 6. Block cipher operation -- 7. Pseudorandom number generation and stream ciphers -- Part Two: Asymmetric ciphers -- 8. More number theory -- 9. Public-key cryptography and RSA -- 10. Other public-key cryptosystems -- Part Three: Cryptographic data integrity algorithms -- 11. Cryptographic hash functions -- 12. Message authentication codes -- 13. Digital signatures -- Part Four: Mutual trust -- 14. Key management and distribution -- 15. User authentication protocols -- Part Five: Network and internet security -- 16. Transport-level security -- 17. Wireless network security -- 18. Electronic mail security -- 19. IP security -- Appendix A: Projects for teaching cryptography and network security -- Appendix B: Sage examples -- Online chapters -- Part Six: System security -- 20. Intruders -- 21. Malicious software -- 22. Firewalls -- Part Seven: Legal and ethical issues -- 23. Legal and ethical issues."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/796035099>
schema:inLanguage"en"
schema:name"Cryptography and network security : principles and practice"@en
schema:numberOfPages"719"
schema:publisher
schema:url
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA9A8167>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.