skip to content
Cryptography and network security : principles and practices Preview this item
ClosePreview this item
Checking...

Cryptography and network security : principles and practices

Author: William Stallings
Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, ©2006.
Edition/Format:   Book : English : 4th edView all editions and formats
Database:WorldCat
Summary:
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network  Read more...
Rating:

based on 5 rating(s) 2 with reviews

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: William Stallings
ISBN: 0131873164 9780131873162 0132023229 9780132023221
OCLC Number: 63126393
Description: xvi, 680 p. : ill. ; 24 cm.
Contents: pt. 1: Symmetric ciphers. Classical encryption techniques --
Block ciphers and the data encryption standard --
Finite fields --
Advanced encryption standard --
More on symmetric ciphers --
Confidentiality using symmetric encryption --
pt. 2: Public-key encryption and hash functions. Introduction to number theory --
Public-key cryptography and RSA --
Key management: other public-key cryptosystems --
Message authentication and hash functions --
Hash and MAC algorithms --
Digital signatures and authentication protocols --
pt. 3: Network security applications. Authentication applications --
Electronic mail security --
IP security --
Web security --
pt. 4: System security. Intruders --
Malicious software --
Firewalls --Appendix A: Standards and standards-setting organizations --
Appendix B: Projects for teaching cryptography and network security.
Responsibility: William Stallings.
More information:

Abstract:

In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Reviews

User-contributed reviews

WorldCat User Reviews (2)

gpd

by reemaa (WorldCat user published 2007-09-28) Good Permalink
dsf
  • 2 of 3 people found this review helpful. Did it help you? 
  •   

network security

by hemasree (WorldCat user published 2008-01-27) Very Good Permalink
principles
  • 1 of 1 people found this review helpful. Did it help you? 
  •   
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

All user tags (6)

View most popular tags as: tag list | tag cloud

  • cs  (by 1 person)
  • es  (by 1 person)
  • it  (by 1 person)
  • shelved  (by 1 person)
  • sw  (by 1 person)
  • tl  (by 1 person)
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/63126393>
library:oclcnum"63126393"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/63126393>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:about
schema:about
schema:bookEdition"4th ed."
schema:copyrightYear"2006"
schema:creator
schema:datePublished"2006"
schema:description"pt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security."@en
schema:description"In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/796035099>
schema:inLanguage"en"
schema:name"Cryptography and network security : principles and practices"@en
schema:numberOfPages"680"
schema:publisher
schema:url
schema:workExample
schema:workExample
umbel:isLike<http://bnb.data.bl.uk/id/resource/GBA738207>

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.