Cryptography and network security : principles and practices /
Material type: TextPublication details: Upper Saddle River, N.J. : Pearson/Prentice Hall, 2006.Edition: 4th edDescription: xvi, 680 pages : illustrations ; 24 cmISBN:- 9788120330184
- Computer networks -- Security measures
- Data encryption (Computer science)
- Coding theory
- Computer security
- Public key cryptography
- Cryptography -- Computer networks
- Computer Security
- Public key cryptography
- Coding theory
- Computer networks -- Security measures
- Computer security
- Data encryption (Computer science)
- Internet
- 005.8
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BC-LIB06872 | ||
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BC-LIB06871 | ||
Books | Botho University Botswana Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BC-LIB06870 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BU-LIB19400 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BU-LIB24089 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BU-LIB24113 | ||
Books | Botho University eSwatini Open Shelves | Information Technology | 005.8 STA (Browse shelf(Opens below)) | Available | BU-LIB19399 |
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
There are no comments on this title.