Normal view MARC view ISBD view

Cryptography and network security / Behrouz A. Forouzan.

By: Forouzan, Behrouz A.
Series: McGraw-Hill Forouzan networking series. Publisher: Boston : McGraw Hill, 2008Description: xxvi, 721 p. : ill. ; 23 cm.ISBN: 9780071263610 (pbk., Int. ed.).Subject(s): Computer networks -- Security measures | CryptographyDDC classification: 005.82
Contents:
1. Introduction -- Part 1 Symmetric-Key encipherment: 2. Mathematics of Cryptography - 3. Traditional Symmetric-Key Ciphers - 4. Mathematics of Cryptography - 5. Introduction to Modern Symmetric-Key Ciphers - 6. Data Encryption Standard (DES) - 7. Advanced Encryption Standard (AES) - 8. Encipherment using modern Symmetric-Key Ciphers -- Part 2 Asymmetric-Key Encipherment: 9. Mathematics of Cryptography - 10. Asymmetric-Key Cryptography -- Part 3. Integrity, Authentication, and Key Management: 11. Message integrity and message authentication - 12. Cryptographic hash functions - 13. Digital signature - 14. Entity authentication - 15. Key management -- Part 4 Network security: 16. Security at the application layer: PGP and S/MIME - 17. Security at the transport layer: SSL and TLS - 18. Security at the network layer: IP Sec -- Appendix
Item type Current location Shelf location Call number Copy number Status Notes Date due Barcode
Main Collection Taylor's Library-TU

Floor 3, Shelf 2 , Side 1, TierNo 1, BayNo 1

005.82 FOR (Browse shelf) 1 Available SOCIT,15009,03,GR 5000115170

Includes bibliographical references (p. 707-708) and index.

1. Introduction -- Part 1 Symmetric-Key encipherment: 2. Mathematics of Cryptography - 3. Traditional Symmetric-Key Ciphers - 4. Mathematics of Cryptography - 5. Introduction to Modern Symmetric-Key Ciphers - 6. Data Encryption Standard (DES) - 7. Advanced Encryption Standard (AES) - 8. Encipherment using modern Symmetric-Key Ciphers -- Part 2 Asymmetric-Key Encipherment: 9. Mathematics of Cryptography - 10. Asymmetric-Key Cryptography -- Part 3. Integrity, Authentication, and Key Management: 11. Message integrity and message authentication - 12. Cryptographic hash functions - 13. Digital signature - 14. Entity authentication - 15. Key management -- Part 4 Network security: 16. Security at the application layer: PGP and S/MIME - 17. Security at the transport layer: SSL and TLS - 18. Security at the network layer: IP Sec -- Appendix