Cryptography and network security : principles and practice
Author(s)
Bibliographic Information
Cryptography and network security : principles and practice
Prentice Hall, 1999
2nd ed.
Available at 18 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references and index
Description and Table of Contents
Description
Appropriate for undergraduate and graduate level courses in Cryptography and Computer security.
Best-selling author and two-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.
Table of Contents
1. Introduction.
I. CONVENTIONAL ENCRYPTION.
2. Conventional Encryption: Classical Techniques.
3. Conventional Encryption: Modern Techniques.
4. Conventional Encryption: Algorithms.
5. Confidentiality Using Conventional Encryption.
II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS.
6. Public-Key Cryptography.
7. Introduction to Number Theory.
8. Message Authentication and Hash Functions.
9. Hash and Mac Algorithms.
10. Digital Signatures and Authentication Protocols.
III. NETWORK SECURITY PRACTICE.
11. Authentication Applications.
12. Electronic Mail Security.
13. IP Security.
14. Web Security.
IV. SYSTEM SECURITY.
15. Intruders, Viruses, and Worms.
16. Firewalls.
Appendix A. Projects for Teaching Cryptography and Network Security.
by "Nielsen BookData"