Cryptography and Network Security (絕)
- 20本以上,享 8.5折
售價
$
洽詢
- 一般書籍
- ISBN:9780071263610
- 作者:Behrouz A. Forouzan
- 版次:1
- 年份:2008
- 出版商:McGraw-Hill
- 頁數/規格:721頁/平裝單色
書籍介紹
本書特色
目錄
Description
A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.
A textbook for beginners in security. In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.
Features
- Provides an overview of security rather than focusing on one specific type of security. Also places math in an appendix at the end of the chapter, so the student won't be overwhelmed
- Usable programs, so students can do hands on activities.
- Up-to-date coverage of all the latest networking technologies.
- Extensive practice sets at the end of each chapter help students reinforce what they have learned and give them an opportunity to work through some more challenging exercises.
- Student-friendly approach moves math to the ends of chapters for an easier explanation of concepts.
- An accompanying website that provides both colorful PowerPoints and solutions.
- Message: Hundreds of figures are used to visually illustrate concepts, making technical material easier to understand. A text for beginners in security
Table of Contents
1 Introduction
Part 1 Symmetric-Key Encipherment
2 Mathematics of Cryptography
3 Traditional Symmetric-Key Ciphers
4 Mathematics of Cryptography
5 Introduction to Modern Symmetric-Key Ciphers
6 Data Encryption Standard (DES)
7 Advanced Encryption Standard (AES)
8 Encipherment Using Modern Symmetric-Key Ciphers
Part 2 Asymmetric-Key Encipherment
9 Mathematics of Cryptography
10 Asymmetric-Key Cryptography
Part 3 Integrity, Authentication, and Key Management
11 Message Integrity and Message Authentication
12 Cryptographic Hash Functions
13 Digital Signature
14 Entity Authentication
15 Key Management
Part 4 Network Security
16 Security at the Application Layer: PGP and S/MIME
17 Security at the Transport Layer: SSL and TLS
18 Security at the Network Layer: IPSec
1 Introduction
Part 1 Symmetric-Key Encipherment
2 Mathematics of Cryptography
3 Traditional Symmetric-Key Ciphers
4 Mathematics of Cryptography
5 Introduction to Modern Symmetric-Key Ciphers
6 Data Encryption Standard (DES)
7 Advanced Encryption Standard (AES)
8 Encipherment Using Modern Symmetric-Key Ciphers
Part 2 Asymmetric-Key Encipherment
9 Mathematics of Cryptography
10 Asymmetric-Key Cryptography
Part 3 Integrity, Authentication, and Key Management
11 Message Integrity and Message Authentication
12 Cryptographic Hash Functions
13 Digital Signature
14 Entity Authentication
15 Key Management
Part 4 Network Security
16 Security at the Application Layer: PGP and S/MIME
17 Security at the Transport Layer: SSL and TLS
18 Security at the Network Layer: IPSec