MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Cryptography and network security : principles and practice / William Stallings.

By: Stallings, William.
Material type: materialTypeLabelBookPublisher: Upper Saddle River, N.J. : Prentice Hall, c1999Edition: 2nd ed.Description: xvii, 569 p : ill ; 24 cm. + hbk.ISBN: 0138690170.Subject(s): Computer networks -- Security measures | Data encryption (Computer science) | Coding theory | Computer securityDDC classification: 005.8
Contents:
Introduction -- Part One: Conventional Encryption -- Conventional Encryption: Classical Techniques -- Conventional Encryption: Modern Techniques -- Conventional Encryption: Algorithms -- Confidentiality using conventional encryption -- Part Two: Public-Key Encryption and Hash Functions -- Public-key cryptography -- Introduction to number theory -- Message Authentication and hash functions -- Hash and Mac Algorithms -- Digital Signatures and Authentication Protocols -- Part Three: Network Security Practice -- Authentication Applications -- Electronic Mail Security -- IP Security -- Web Security -- Part Four: System Security -- Intruders, Viruses and Worms -- Firewalls.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.8 (Browse shelf(Opens below)) 1 Available 00071031
General Lending MTU Bishopstown Library Store Item 005.8 (Browse shelf(Opens below)) 1 Available 00083525
Total holds: 0

Enhanced descriptions from Syndetics:

As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the disciplines of cryptography and network security have matured, leading to the development of practical, available applications to enforce network security. Best-selling author and two-time winner of the TEXTY award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security. Extensively reorganized to provide the optimal sequence for classroom instruction and self-study, the second edition includes these key features. * Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems. * NEW - Discussion of block cipher design principles, plus coverage of Blowfish, CAST-128, Triple DES, and other algorithms * NEW - Chapters on IP security and Web security * Expanded coverage of public-key encryption algorithms and design princip

Rev. ed of: Network and internetwork security.

Includes bibliographical references (pages 545-558) and index.

Introduction -- Part One: Conventional Encryption -- Conventional Encryption: Classical Techniques -- Conventional Encryption: Modern Techniques -- Conventional Encryption: Algorithms -- Confidentiality using conventional encryption -- Part Two: Public-Key Encryption and Hash Functions -- Public-key cryptography -- Introduction to number theory -- Message Authentication and hash functions -- Hash and Mac Algorithms -- Digital Signatures and Authentication Protocols -- Part Three: Network Security Practice -- Authentication Applications -- Electronic Mail Security -- IP Security -- Web Security -- Part Four: System Security -- Intruders, Viruses and Worms -- Firewalls.

Table of contents provided by Syndetics

  • 1 Overview
  • I Conventional Encryption
  • 2 Conventional Encryption: Classical Techniques
  • 3 Conventional Encryption: Modern Techniques
  • 4 Introduction to Finite Fields
  • 5 Conventional Encryption: AES
  • 6 Contemporary Symmetric Ciphers
  • 7 Confidentiality Using Conventional Encryption
  • II Public-Key Encryption And Hash Functions
  • 8 Introduction to Number Theory
  • 9 Public-Key Cryptography
  • 10 Key Management
  • 11 Message Authentication and Hash Functions
  • 12 Hash and Mac Algorithms
  • 13 Digital Signatures and Authentication Protocols
  • III Network Security Practice
  • 14 Authentication Applications
  • 15 Electronic Mail Security
  • 16 IP Security
  • 17 Web Security
  • IV System Security
  • 18 Intruders and Viruses
  • 19 Firewalls
  • Appendix A Standards and Standard-Setting Organizations
  • Appendix B Projects for Teaching Cryptography and Network Security
  • Glossary
  • References
  • Index
  • List of Acronyms

Powered by Koha