Cryptography and Network Security
Pearson (Verlag)
978-0-13-111502-6 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
For one-semester, undergraduate/graduate level courses in Cryptography, Computer Security, and Network Security.
Best-selling author and four-time winner of the TEXTY award for the best Computer Science and Engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. This text, which won the 1999 TAA Award for the best computer science and engineering textbook of the year, has been completely updated to reflect the latest developments in the field. It has also been extensively reorganized to provide the optimal sequence for classroom instruction and self-study.
William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings.
1. Overview.
I. CONVENTIONAL ENCRYPTION.
2. Conventional Encryption: Classical Techniques.
3. Conventional Encryption: Modern Techniques.
4. Introduction to Finite Fields.
5. Conventional Encryption: AES.
6. Contemporary Symmetric Ciphers.
7. Confidentiality Using Conventional Encryption.
II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS.
8. Introduction to Number Theory.
9. Public-Key Cryptography.
10. Key Management.
11. Message Authentication and Hash Functions.
12. Hash and Mac Algorithms.
13. Digital Signatures and Authentication Protocols.
III. NETWORK SECURITY PRACTICE.
14. Authentication Applications.
15. Electronic Mail Security.
16. IP Security.
17. Web Security.
IV. SYSTEM SECURITY.
18. Intruders and Viruses.
19. Firewalls.
Appendix A. Standards and Standard-Setting Organizations.
Appendix B. Projects for Teaching Cryptography and Network Security.
Glossary.
References.
Index.
List of Acronyms.
Erscheint lt. Verlag | 4.9.2002 |
---|---|
Sprache | englisch |
Maße | 179 x 235 mm |
Gewicht | 1014 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-13-111502-2 / 0131115022 |
ISBN-13 | 978-0-13-111502-6 / 9780131115026 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich