Cryptography and network security : principles and practice
著者
書誌事項
Cryptography and network security : principles and practice
Pearson, c2023
8th ed., global ed
- : pbk
大学図書館所蔵 件 / 全2件
-
該当する所蔵館はありません
- すべての絞り込み条件を解除する
注記
Includes bibliographical references and index
内容説明・目次
内容説明
For courses in Cryptography, Computer Security, and Network Security.
Keep pace with the fast-moving field of cryptography and network security
Stallings' Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
目次
Computer and Network Security Concepts
Introduction to Number Theory
Classical Encryption Techniques
Block Ciphers and the Data Encryption Standard
Finite Fields
Advanced Encryption Standard
Block Cipher Operation
Random Bit Generation and Stream Ciphers
Public-Key Cryptography and RSA
Other Public-Key Cryptosystems
Cryptographic Hash Functions
Message Authentication Codes
Digital Signatures
Lightweight Cryptography and Post-Quantum Cryptography
Key Management and Distribution
User Authentication Protocols
Transport-Level Security
Wireless Network Security
Electronic Mail Security
IP Security
Network Endpoint Security
Cloud Security
Internet of Things (IoT) Security
Appendix A. Basic Concepts from Linear Algebra
Appendix B. Measures of Security and Secrecy
Appendix C. Data Encryption Standard (DES)
Appendix D. Simplified AES
Appendix E. Mathematical Basis of the Birthday Attack
「Nielsen BookData」 より