Cryptography and network security principles and practice
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security A practical survey of cryptography and network security with unmatched support for instructors and students In this age of universal electronic connectivity, viruses and hackers, elect...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Harlow, Essex
Pearson
2014.
|
| Edition: | 6th ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Chapter 0 Guide for Readers and Instructors
- Chapter 1 Overview
- Part One Symmetric Ciphers
- Chapter 2 Classical Encryption Techniques
- Chapter 3 Block Ciphers and the Data Encryption Standard
- Chapter 4 Basic Concepts in Number Theory and Finite Fields
- Chapter 5 Advanced Encryption Standard
- Chapter 6 Block Cipher Operation
- Chapter 7 Pseudorandom Number Generation and Stream Ciphers
- Part Two Asymmetric Ciphers
- Chapter 8 More Number Theory
- Chapter 9 Public-Key Cryptography and RSA
- Chapter 10 Other Public-Key Cryptosystems
- Part Three Cryptographic Data Integrity Algorithms
- Chapter 11 Cryptographic Hash Functions
- Chapter 12 Message Authentication Codes
- Chapter 13 Digital Signatures
- Part Four Mutual Trust
- Chapter 14 Key Management and Distribution
- Chapter 15 User Authentication
- Part Five Network And Internet Security
- Chapter 16 Network Access Control and Cloud Security
- Chapter 17 Transport-Level Security
- Chapter 18 Wireless Network Security
- Chapter 19 Electronic Mail Security
- Chapter 20 IP Security
- Appendix A Projects for Teaching Cryptography and Network Security
- Appendix B Sage Examples
- References
- Credits
- Index
- Online Chapters and Appendices1
- Part Six System Security
- Chapter 21 Malicious Software
- Chapter 22 Intruders
- Chapter 23 Firewalls
- Part seven Legal And Ethical Issues
- Chapter 24 Legal and Ethical Issues
- Appendix C Sage Exercises
- Appendix D Standards and Standards-Setting Organizations
- Appendix E Basic Concepts from Linear Algebra
- Appendix F Measures of Security and Secrecy
- Appendix G Simplified DES
- Appendix H Evaluation Criteria for AES
- Appendix I More on Simplified AES
- Appendix J Knapsack Public-Key Algorithm
- Appendix K Proof of the Digital Signature Algorithm
- Appendix L TCP/IP and OSI
- Appendix M Java Cryptographic APIs
- Appendix N MD5 and Whirlpool Hash Functions
- Appendix O Data Compression Using ZIP
- Appendix P More on PGP
- Appendix Q The International Reference Alphabet
- Appendix R Proof of the RSA Algorithm
- Appendix S Data Encryption Standard (DES)
- Appendix T Kerberos Encryption Techniques
- Appendix U Mathematical Basis of the Birthday Attack
- Appendix V Evaluation Criteria for SHA-3.


