The KCAU Library

Image from Google Jackets

Cryptography and network security : principles and practice / William Stallings.

By: Material type: TextTextPublication details: New Delhi : Pearson Education, Inc./Dorling Kindersley Publishing Inc., c2006.Edition: 4th edDescription: xvi, 680 p. : ill. ; 24 cmISBN:
  • 9788177587746
Subject(s): LOC classification:
  • TK5105.59 .S713 2006
Contents:
Ch. 1. Introduction -- Ch. 2. Classical encryption techniques -- Ch. 3. Block ciphers and the data encryption standard -- Ch. 4. Finite fields -- Ch. 5. Advanced encryption standard -- Ch. 6. More on symmetric ciphers -- Ch. 7. Confidentiality using symmetric encryption -- Ch. 8. Introduction to number theory -- Ch. 9. Public-key cryptography and RSA -- Ch. 10. Key management; other public-key cryptosystems -- Ch. 11. Message authentication and hash functions -- Ch. 12. Hash and MAC algorithms -- Ch. 13. Digital signatures and authentication protocols -- Ch. 14. Authentication applications -- Ch. 15. Electronic mail security -- Ch. 16. IP security -- Ch. 17. Web security -- Ch. 18. Intruders -- Ch. 19. Malicious software -- Ch. 20. Firewalls -- App. A. Standards and standards-setting organizations -- App. B. Projects for teaching cryptography and network security.
Reviews from LibraryThing.com:
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Vol info Status Date due Barcode
Main Short Main Short KCA Kisumu Campus Non-fiction TK5105.59 .S713 2006 (Browse shelf(Opens below)) 3585/10 Available Z00039276

Includes bibliographical references (p. 663-672) and index.

Ch. 1. Introduction -- Ch. 2. Classical encryption techniques -- Ch. 3. Block ciphers and the data encryption standard -- Ch. 4. Finite fields -- Ch. 5. Advanced encryption standard -- Ch. 6. More on symmetric ciphers -- Ch. 7. Confidentiality using symmetric encryption -- Ch. 8. Introduction to number theory -- Ch. 9. Public-key cryptography and RSA -- Ch. 10. Key management; other public-key cryptosystems -- Ch. 11. Message authentication and hash functions -- Ch. 12. Hash and MAC algorithms -- Ch. 13. Digital signatures and authentication protocols -- Ch. 14. Authentication applications -- Ch. 15. Electronic mail security -- Ch. 16. IP security -- Ch. 17. Web security -- Ch. 18. Intruders -- Ch. 19. Malicious software -- Ch. 20. Firewalls -- App. A. Standards and standards-setting organizations -- App. B. Projects for teaching cryptography and network security.

There are no comments on this title.

to post a comment.
KCAU Library,
KCA University ,
Thika Road Ruaraka
P. O. Box 56808 – 00200 Nairobi, Kenya

More Links

Powered by Koha