Local cover image
Local cover image

Cryptography and network security. Principles and Practice

By: Material type: TextTextLanguage: English Publication details: New Jersey : Prentice-Hall, 1999.Edition: 2° edDescription: 569 pSubject(s): Online resources:
Contents:
1. Introduction. I. CONVENTIONAL ENCRYPTION. 2. Conventional Encryption: Classical Techniques. 3. Conventional Encryption: Modern Techniques. 4. Conventional Encryption: Algorithms. 5. Confidentiality Using Conventional Encryption. II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. 6. Public-Key Cryptography. 7. Introduction to Number Theory. 8. Message Authentication and Hash Functions. 9. Hash and Mac Algorithms. 10. Digital Signatures and Authentication Protocols. III. NETWORK SECURITY PRACTICE. 11. Authentication Applications. 12. Electronic Mail Security. 13. IP Security. 14. Web Security. IV. SYSTEM SECURITY. 15. Intruders, Viruses, and Worms. 16. Firewalls. Appendix A. Projects for Teaching Cryptography and Network Security.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Libros Libros Biblioteca Dr. Orestes Di Lullo Colección General 004.056.55 STA (Cry) (Browse shelf(Opens below)) Available SGO15064

1. Introduction. I. CONVENTIONAL ENCRYPTION. 2. Conventional Encryption: Classical Techniques. 3. Conventional Encryption: Modern Techniques. 4. Conventional Encryption: Algorithms. 5. Confidentiality Using Conventional Encryption. II. PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS. 6. Public-Key Cryptography. 7. Introduction to Number Theory. 8. Message Authentication and Hash Functions. 9. Hash and Mac Algorithms. 10. Digital Signatures and Authentication Protocols. III. NETWORK SECURITY PRACTICE. 11. Authentication Applications. 12. Electronic Mail Security. 13. IP Security. 14. Web Security. IV. SYSTEM SECURITY. 15. Intruders, Viruses, and Worms. 16. Firewalls. Appendix A. Projects for Teaching Cryptography and Network Security.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image