gogogo
Syndetics cover image
Image from Syndetics

Cryptology and network security / Principles and practices

By: Material type: TextTextPublication details: USA US Imp & PHIPEs 1998Edition: 2nd edDescription: 560p., 235 x 178mm, Illustrations, hardbackISBN:
  • 0138690170
Subject(s):
Contents:
Overview; conventional encryption - classical techniques; conventional encryption - modern techniques; conventional encryption - algorithms; condfidentiality using conventional encryption; public-key cryptography; introduction to number theory; message authentication and hash functions; hash and Mac algorithms; digital signatures and authentication protocols authentication applications electronic mail security; IP security; Web security; intruders, viruses and worms; firewalls. Appendix: projects for teaching.
Holdings
Item type Current library Call number Status Date due Barcode
Standard Loan Thurles Library Main Collection 005.8 STA (Browse shelf(Opens below)) Available R03730LKRCT
Standard Loan Thurles Library Main Collection 005.8 STA (Browse shelf(Opens below)) Available R14409KRCT
Standard Loan Thurles Library Main Collection 005.8 STA (Browse shelf(Opens below)) Available R05237FKRCT

Enhanced descriptions from Syndetics:

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the disciplines of cryptography and network security have matured, leading to the development of practical, available applications to enforce network security. Best-selling author and two-time winner of the TEXTY award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. Extensively reorganized to provide the optimal sequence for classroom instruction and self-study, the second edition includes these key features. * Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. * NEW - Discussion of block cipher design principles, plus coverage of Blowfish, CAST-128, Triple DES, and other algorithms * NEW - Chapters on IP security and Web security * Expanded coverage of public-key encryption algorithms and design princip

EXTENSIVELY REORGANISED TO PROVIDE THE OPTIMAL SEQUENCE FOR CLASSROOM INSTRUCTION AND SELF STUDY.

Offering updated coverage of web security, this work explores the two most important web security standards: SSL/TLS and SET. It includes new coverage of firewalls.

Overview; conventional encryption - classical techniques; conventional encryption - modern techniques; conventional encryption - algorithms; condfidentiality using conventional encryption; public-key cryptography; introduction to number theory; message authentication and hash functions; hash and Mac algorithms; digital signatures and authentication protocols authentication applications electronic mail security; IP security; Web security; intruders, viruses and worms; firewalls. Appendix: projects for teaching.

Table of contents provided by Syndetics

  • 1 Overview
  • I Conventional Encryption
  • 2 Conventional Encryption: Classical Techniques
  • 3 Conventional Encryption: Modern Techniques
  • 4 Introduction to Finite Fields
  • 5 Conventional Encryption: AES
  • 6 Contemporary Symmetric Ciphers
  • 7 Confidentiality Using Conventional Encryption
  • II Public-Key Encryption And Hash Functions
  • 8 Introduction to Number Theory
  • 9 Public-Key Cryptography
  • 10 Key Management
  • 11 Message Authentication and Hash Functions
  • 12 Hash and Mac Algorithms
  • 13 Digital Signatures and Authentication Protocols
  • III Network Security Practice
  • 14 Authentication Applications
  • 15 Electronic Mail Security
  • 16 IP Security
  • 17 Web Security
  • IV System Security
  • 18 Intruders and Viruses
  • 19 Firewalls
  • Appendix A Standards and Standard-Setting Organizations
  • Appendix B Projects for Teaching Cryptography and Network Security
  • Glossary
  • References
  • Index
  • List of Acronyms

Powered by Koha