Crytography ans network security: principles and practice
Stallings, William
Crytography ans network security: principles and practice - 8a. Edición - Reino Unido, Pearson 2022 - 832 páginas gráficos; tablas 23x18 cm
incluye índice de contenido
"Computer and Network Security Concepts.-Introduction to Number Theory
Classical Encryption Techniques.-Block Ciphers and the Data Encryption Standard
Finite Fields.-Advanced Encryption Standard.-Block Cipher Operation.-Random Bit Generation and Stream Ciphers.-Public-Key Cryptography and RSA.-Other Public-Key Cryptosystems.-Cryptographic Hash Functions
Message Authentication Codes.-Digital Signatures.-Lightweight Cryptography and Post-Quantum.-Cryptography.-Key Management and Distribution.-User Authentication Protocols.-Transport-Level Security.-
Wireless Network Security.-Electronic Mail Security.-IP Security.-Network Endpoint Security.-Cloud Security.-Internet of Things (IoT) Security.-Appendix A. Basic Concepts from Linear Algebra.-Appendix B. Measures of Security and Secrecy.-Appendix C. Data Encryption Standard (DES).-Appendix D. Simplified AES.-Appendix E. Mathematical Basis of the Birthday Attack.-"
978-1-292-43748-4
encryption operation public-key
005.8 / ST782c
Crytography ans network security: principles and practice - 8a. Edición - Reino Unido, Pearson 2022 - 832 páginas gráficos; tablas 23x18 cm
incluye índice de contenido
"Computer and Network Security Concepts.-Introduction to Number Theory
Classical Encryption Techniques.-Block Ciphers and the Data Encryption Standard
Finite Fields.-Advanced Encryption Standard.-Block Cipher Operation.-Random Bit Generation and Stream Ciphers.-Public-Key Cryptography and RSA.-Other Public-Key Cryptosystems.-Cryptographic Hash Functions
Message Authentication Codes.-Digital Signatures.-Lightweight Cryptography and Post-Quantum.-Cryptography.-Key Management and Distribution.-User Authentication Protocols.-Transport-Level Security.-
Wireless Network Security.-Electronic Mail Security.-IP Security.-Network Endpoint Security.-Cloud Security.-Internet of Things (IoT) Security.-Appendix A. Basic Concepts from Linear Algebra.-Appendix B. Measures of Security and Secrecy.-Appendix C. Data Encryption Standard (DES).-Appendix D. Simplified AES.-Appendix E. Mathematical Basis of the Birthday Attack.-"
978-1-292-43748-4
encryption operation public-key
005.8 / ST782c