Welcome to UE Central Library

Keep Smiling

Cryptography and network security : (Record no. 504)

MARC details
000 -LEADER
fixed length control field 07633cam a22002537a 4500
001 - CONTROL NUMBER
control field 1797
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200702104451.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 060518s2006 njua b 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9788177587746
040 ## - CATALOGING SOURCE
Transcribing agency PK
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
Item number S7827
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William.
245 10 - TITLE STATEMENT
Title Cryptography and network security :
Remainder of title principles and practice /
Statement of responsibility, etc William Stallings.
250 ## - EDITION STATEMENT
Edition statement 4th ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New Delhi :
Name of publisher, distributor, etc Pearson/Prentice Hall,
Date of publication, distribution, etc 2009
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 680 p.
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes bibliographical references (p. 663-672) and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 0 reader's guide 1<br/>Outline of this book 2<br/>Roadmap 2<br/>Internet and web resources 4<br/>Chapter 1 introduction 6<br/>Security trends 9<br/>The osi security architecture 12<br/>Security attacks 13<br/>Security services 16<br/>Security mechanisms 19<br/>A model for network security 22<br/>Recommended reading and web sites 24<br/>Key terms, review questions, and problems 25<br/>Part one symmetric ciphers 26<br/>Chapter 2 classical encryption techniques 28<br/>2.1 symmetric cipher model 30<br/>2.2 substitution techniques 35<br/>2.3 transposition techniques 49<br/>2.4 rotor machines 51<br/>2.5 steganography 53<br/>2.6 recommended reading and web sites 55<br/>2.7 key terms, review questions, and problems 56<br/>Chapter 3 block ciphers and the data encryption standard 62<br/>3.1 block cipher principles 64<br/>3.2 the data encryption standard 72<br/>3.3 the strength of des 82<br/>3.4 differential and linear cryptanalysis 83<br/>3.5 block cipher design principles 86<br/>3.6 recommended reading 90<br/>3.7 key terms, review questions, and problems 90<br/>Chapter 4 finite fields 95<br/>4.1 groups, rings, and fields 97<br/>4.2 modular arithmetic 101<br/>4.3 the euclidean algorithm 107<br/>4.4 finite fields of the form gf(p) 109<br/>4.5 polynomial arithmetic 113<br/>4.6 finite fields of the form gf(2") 119<br/>4.7 recommended reading and web sites 129<br/>4.8 keyterms, review questions, and problems 130<br/>Chapter 5 advanced encryption standard 134<br/>5.1 evaluation criteria foraes 135<br/>5.2 the aes cipher 140<br/>5.3 recommended reading and web sites 160<br/>5.4 key terms, review questions, and problems 161<br/>Appendix 5a polynomials with coefficients in gf(28) 163<br/>Appendix 5b simplified aes 165<br/>Chapter 6 more on symmetric ciphers 174<br/>6.1 multiple encryption and triple des 175<br/>6.2 block cipher modes of operation 181<br/>6.3 stream ciphers and rc4 189<br/>6.4 recommended reading and web site 194<br/>6.5 key terms, review questions, and problems 194<br/>Chapter 7 confidentiality using symmetric encryption 199<br/>7.1 placement of encryption function 201<br/>7.2 traffic confidentiality 209<br/>7.3 key distribution 210<br/>7.4 random number generation 218<br/>7.5 recommended reading and web sites 227<br/>7.6 key terms, review questions, and problems 228<br/>Part two public-key encryption and hash functions 232<br/>Chapter 8 introduction to number theory 234<br/>8.1 prime numbers 236<br/>8.2 fermat's and euler's theorems 238<br/>8.3 testing for primality 242<br/>8.4 the chinese remainder theorem 245<br/>8.5 discrete logarithms 247<br/>8.6 recommended reading and web site 253<br/>8.7 key terms, review questions, and problems 254<br/>Chapter 9 public-key cryptography and rsa 257<br/>9.1 principles of public-key cryptosystems 259<br/>9.2 the rsa algorithm 268<br/>9.3 recommended reading and web site 280<br/>9.4 key terms, review questions, and problems 281<br/>Appendix 9a proof of the rsa algorithm 285<br/>Appendix 9b the complexity of algorithms 286<br/>Chapter 10 key management; other public-key cryptosystems 289<br/>10.1 key management 290<br/>10.2 diffie-hellman key exchange 298<br/>10.3 elliptic curve arithmetic 301<br/>10.4 elliptic curve cryptography 310<br/>10.5 recommended reading and web site 313<br/>10.6 key terms, review questions, and problems 314<br/>Chapter 11 message authentication and hash functions 317<br/>11.1 authentication requirements 319<br/>11.2 authentication functions 320<br/>11.3 message authentication codes 331<br/>11.4 hash functions 334<br/>11.5 security of hash functions and macs 340<br/>11.6 recommended reading 344<br/>11.7 key terms, review questions, and problems 344<br/>Appendix 11 a mathematical basis of the birthday attack 346<br/>Chapter 12 hash and mac algorithms 351<br/>12.1 secure hash algorithm 353<br/>12.2 whirlpool 358<br/>12.3 hmac 368<br/>12.4 cmac 372<br/>12.5 recommended reading and web sites 374<br/>12.6 key terms, review questions, and problems 375<br/>Chapter 13 digital signatures and authentication protocols 377<br/>13.1 digital signatures 378<br/>13.2 authentication protocols 382<br/>13.3 digital signature standard 390<br/>13.4 recommended reading and web sites 393<br/>13.5 key terms, review questions, and problems 393<br/>Part three network security applications 398<br/>Chapter 14 authentication applications 400<br/>14.1 kerberos 401<br/>14.2 x.509 authentication service 419<br/>14.3 public-key infrastructure 428<br/>14.4 recommended reading and web sites 430<br/>14.5 key terms, review questions, and problems 431<br/>Appendix 14a kerberos encryption techniques 433<br/>Chapter 15 electronic mail security 436<br/>15.1 pretty good privacy 438<br/>15.2 s/mime 457<br/>15.3 recommended web sites 474<br/>15.4 keyterms, review questions, and problems 474<br/>Appendix 15a data compression using zip 475<br/>Appendix 15b radix-64 conversion 478<br/>Appendix 15c pgp random number generation 479<br/>Chapter 16 ip security 483<br/>16.1 ip security overview 485<br/>16.2 ip security architecture 487<br/>16.3 authentication header 493<br/>16.4 encapsulating security payload 498<br/>16.5 combining security associations 503<br/>16.6 key management 506<br/>16.7 recommended reading and web site 516<br/>16.8 key terms, review questions, and problems 517<br/>Appendix 16a internetworking and internet protocols 518<br/>Chapter 17 web security 527<br/>17.1 web security considerations 528<br/>17.2 secure socket layer and transport layer security 531<br/>17.3 secure electronic transaction 549<br/>17.4 recommended reading and web sites 560<br/>17.5 key terms, review questions, and problems 561<br/>Part four system security 563<br/>Chapter 18 intruders 565<br/>18.1 intruders 567<br/>18.2 intrusion detection 570<br/>18.3 password management 582<br/>18.4 recommended reading and web sites 591<br/>18.5 key terms, review questions, and problems 592<br/>Appendix 18a the base-rate fallacy 594<br/>Chapter 19 malicious software 598<br/>19.1 viruses and related threats 599<br/>19.2 virus countermeasures 610<br/>19.3 distributed denial of service attacks 614<br/>19.4 recommended reading and web sites 619<br/>19.5 key terms, review questions, and problems 620<br/>Chapter 20 firewalls 621<br/>20.1 firewall design principles 622<br/>20.2 trusted systems 634<br/>20.3 common criteria for information technology security evaluation 640<br/>20.3 recommended reading and web sites 644<br/>20.4 key terms, review questions, and problems 645<br/>Appendices 647<br/>Appendix a standards and standards-setting organizations 647<br/>A.1 the importance of standards 648<br/>A.2 internet standards and the internet society 649<br/>A.3 national institute of standards and technology 652<br/>Appendix b projects for teaching cryptography and network security 653<br/>B.1 research projects 654<br/>B.2 programming projects 655<br/>B.3 laboratory exercises 655<br/>B.4 writing assignments 655<br/>B.5 reading/report assignments 656<br/>
Holdings
Withdrawn status Damaged status Not for loan Home library Current library Date acquired Source of acquisition Full call number Barcode Date last seen Price effective from Koha item type
      UE-Central Library UE-Central Library 07.06.2018 U.E. 005.82 S7827 T1797 09.05.2022 07.06.2018 Books
Copyright © 2023, University of Education, Lahore. All Rights Reserved.
Email:centrallibrary@ue.edu.pk