Cryptography and network security : principles and practice cryptography and network security / by William Stallings.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 005.82 STC 2023 (Browse shelf(Opens below)) | C-1 | Not For Loan | 31678 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 005.82 STC 2023 (Browse shelf(Opens below)) | C-2 | Available | 31679 |
Browsing Dr. S. R. Lasker Library, EWU shelves, Shelving location: Reserve Section Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 DIG 2002 Digital signatures / | 005.82 GAC 2002 Cryptography for Internet and database applications : | 005.82 OOC 2021 Computer security and the internet : tools and jewels from malware to bitcoin / | 005.82 STC 2023 Cryptography and network security : principles and practice cryptography and network security / | 005.932 MCC 2002 Customizing and upgrading Linux / | 005.932 MCI 2002 Installing and administering Linux / | 005.932 MCR 2000 Learning Red Hat Linux / |
Includes Index.
Table of contents 1. Computer and Network Security Concepts 2. Introduction to Number Theory 3. Classical Encryption Techniques 4. Block Ciphers and the Data Encryption Standard 5. Finite Fields 6. Advanced Encryption Standard 7. Block Cipher Operation 8. Random Bit Generation and Stream Ciphers 9. Public-Key Cryptography and RSA 10. Other Public-Key Cryptosystems 11. Cryptographic Hash Functions 12. Message Authentication Codes 13. Digital Signatures 14. Lightweight Cryptography and Post-Quantum Cryptography 15. Key Management and Distribution 16. User Authentication Protocols 17. Transport-Level Security 18. Wireless Network Security 19. Electronic Mail Security 20. IP Security 21. Network Endpoint Security 22. Cloud Security 23. Internet of Things (IoT) Security Appendix A. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday
Computer Science & Engineering Computer Science & Engineering
Muktadir Rahman
There are no comments on this title.