Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010020194 | TK5105.59 S713 2003 | Open Access Book | Book | Searching... |
Searching... | 30000010059059 | TK5105.59 S713 2003 | Open Access Book | Book | Searching... |
Searching... | 33000000002815 | TK5105.59 S713 2003 | Open Access Book | Gift Book | Searching... |
On Order
Summary
Summary
For one-semester undergraduate/graduate level courses and for self-study. William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field.
Author Notes
William Stallings has made a unique contribution to understanding the broad sweep of technical developments in computer networking and computer architecture. He has authored 18 titles, and counting revised editions, a total of 48 books on various aspects of this subject. 1 lc has won the annual Text and Academic Authors Association award five times for the best computer science and engineering text. He is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions. He maintains the Computer Science Technical Resciurce site at http://www.WilliamStallings.com/StudentSupport.html. Dr. Stallings holds a Ph.D. degree in Computer Science from M.LT. All of his Prentice Hall title's can he found at the Prentice Hall web site http://www.prenhall.com/stallings .
Table of Contents
1 Overview |
I Conventional Encryption |
2 Conventional Encryption: Classical Techniques |
3 Conventional Encryption: Modern Techniques |
4 Introduction to Finite Fields |
5 Conventional Encryption: AES |
6 Contemporary Symmetric Ciphers |
7 Confidentiality Using Conventional Encryption |
II Public-Key Encryption And Hash Functions |
8 Introduction to Number Theory |
9 Public-Key Cryptography |
10 Key Management |
11 Message Authentication and Hash Functions |
12 Hash and Mac Algorithms |
13 Digital Signatures and Authentication Protocols |
III Network Security Practice |
14 Authentication Applications |
15 Electronic Mail Security |
16 IP Security |
17 Web Security |
IV System Security |
18 Intruders and Viruses |
19 Firewalls |
Appendix A Standards and Standard-Setting Organizations |
Appendix B Projects for Teaching Cryptography and Network Security |
Glossary |
References |
Index |
List of Acronyms |