Cryptography and network security : Principles and practice / William Stallings.
Idioma: Inglés United Kingdom : Pearson Education Limited , 2023Edición: Eighth editionDescripción: 832 páginas : ilustraciones, figurasTipo de contenido:- text
- unmediated
- volume
- 9781292437484
- 005.824 S782c 2023
Tipo de ítem | Biblioteca actual | Colección | Signatura topográfica | Copia número | Estado | Fecha de vencimiento | Código de barras | |
---|---|---|---|---|---|---|---|---|
Libros | Biblioteca Central Estantería | General | 005.824 S782c 2023 (Navegar estantería(Abre debajo)) | c.1 | Disponible | 024380 | ||
Libros | Biblioteca Central Estantería | General | 005.824 S782c 2023 (Navegar estantería(Abre debajo)) | c.2 | Disponible | 024381 | ||
Libros | Biblioteca Central Estantería | General | 005.824 S782c 2023 (Navegar estantería(Abre debajo)) | c.3 | Disponible | 024382 | ||
Libros | Biblioteca Central Estantería | General | 005.824 S782c 2023 (Navegar estantería(Abre debajo)) | c.4 | Disponible | 024383 |
Navegando Biblioteca Central estanterías, Ubicación en estantería: Estantería, Colección: General Cerrar el navegador de estanterías (Oculta el navegador de estanterías)
005.824 S359a 1996 Applied cryptography : Protocols, algorithms, and source code in C / | 005.824 S782c 2023 Cryptography and network security : Principles and practice / | 005.824 S782c 2023 Cryptography and network security : Principles and practice / | 005.824 S782c 2023 Cryptography and network security : Principles and practice / | 005.824 S782c 2023 Cryptography and network security : Principles and practice / | 006.22 C385s 2014 Sistemas embebidos en FPGA / | 006.22 C385s 2014 Sistemas embebidos en FPGA / |
Incluye índice, glosario.
Bibliografía : páginas 804-814
PART ONE: BACKGROUND. Chapter 1. Information and network security concepts. - Chapter 2. Introduction to number theory. -
PART TWO: SYMMETRIC CIPHERS. Chapter 3. Classical encryption techniques. - Chapter 4. Block ciphers and the data encryption standard. - Chapter 5. Finite fields. - Chapter 6. Advanced ecryption standard. - Chapter 7. Block cipher operation. - Chapter 8. Random bit generation and stream ciphers.
PART THREE. ASYMMETRIC CIPHERS. Chapter 9. Public-key cryptography and RSA. - Chapter 10. Other public-key cryptosystems.
PART FOUR. CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS. Chapter 11. Cryptographic hash functions. - Chapter 12. Message authentication codes. - Chapter 13. Digital signatures. - Chapter 14. Lightweight cryptography and post-quantum cryptography.
PART FIVE. MUTUAL TRUST. Chapter 15. Cryptographic key management and distribution. - Chapter 16. User authentication.
PART SIX. NETWORK AND INTERNET SECURITY. Chapter 17. Transport-level security. - Chapter 18. Wireless network security. - Chapter 19. Electronic mail security. - Chapter 20. IP security. - Chapter 21. Network endpoint security. - Chapter 22. Cloud security. - Chapter 23. Internet of things (IoT) security. -