Cryptography and network security : principles and practice /: principles and practice. (2022)
- Record Type:
- Book
- Title:
- Cryptography and network security : principles and practice /: principles and practice. (2022)
- Main Title:
- Cryptography and network security : principles and practice
- Further Information:
- Note: William Stallings.
- Authors:
- Stallings, William
- Contents:
- <span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri", sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman"">1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security<br style="mso-special-character:line-break"> <!--[if !supportLineBreakNewLine]--><br style="mso-special-character:line-break"> <!--[endif]--> <p class="MsoNormal" style="mso-pagination:none"><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri", sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman"">AppendixA. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E.<span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri", sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman"">1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security<br style="mso-special-character:line-break"> <!--[if !supportLineBreakNewLine]--><br style="mso-special-character:line-break"> <!--[endif]--> <p class="MsoNormal" style="mso-pagination:none"><span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri", sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman"">AppendixA. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday Attack <span lang="EN-US" style="font-size:11.0pt;font-family:"Calibri", sans-serif;mso-ascii-theme-font:minor-latin;mso-hansi-theme-font:minor-latin;mso-bidi-font-family:"Times New Roman"">. … (more)
- Edition:
- Eighth edition Global edition
- Publisher Details:
- Upper Saddle River : Pearson
- Publication Date:
- 2022
- Extent:
- 1 online resource, illustrations
- Subjects:
- 005.82
Data encryption (Computer science)
Computer networks -- Security measures - Languages:
- English
- ISBNs:
- 9781292437491
- Related ISBNs:
- 9781292437484
- Notes:
- Note: Includes bibliographical references and index.
Note: Description based on CIP data; resource not viewed. - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.693751
- Ingest File:
- 12_024.xml