Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography and network security
Bookmark Share

Text

Cryptography and network security

Stallings, William - Personal Name;

Anak judul: principles and practice.
Termasuk bibliografi dan indeks.

CONTENTS:

Chapter 1 Overview

< >1.1 Computer Security Concepts

< >1.2 The OSI Security Architecture

< >1.3 Security Attacks

< >1.4 Security Services

< >1.5 Security Mechanisms

< >1.6 A Model for Network Security

< >1.7 Recommended Reading

< >1.8 Key Terms, Review Questions, and Problems Part One Symmetric Ciphers


Chapter 2 Classical Encryption Techniques

< >2.1 Symmetric Cipher Model

< >2.2 Substitution Techniques

< >2.3 Transposition Techniques

< >2.4 Rotor Machines

< >2.5 Steganography

< >2.6 Recommended Reading

< >2.7 Key Terms, Review Questions, and Problems


Chapter 3 Block Ciphers and the Data Encryption Standard

< >3.1 Traditional Block Cipher Structure

< >3.2 The Data Encryption Standard

< >3.3 A DES Example

< >3.4 The Strength of DES

< >3.5 Block Cipher Design Principles

< >3.6 Recommended Reading

< >3.7 Key Terms, Review Questions, and Problems


Chapter 4 Basic Concepts in Number Theory and Finite Fields

< >4.1 Divisibility and the Division Algorithm

< >4.2 The Euclidean Algorithm

< >4.3 Modular Arithmetic

< >4.4 Groups, Rings, and Fields


< >4.5 Finite Fields of the Form GF( p )

< >4.6 Polynomial Arithmetic

< >4.7 Finite Fields of the Form GF(2n )

< >4.8 Recommended Reading

< >4.9 Key Terms, Review Questions, and Problems


Chapter 5 Advanced Encryption Standard

< >5.1 Finite Field Arithmetic

< >5.2 AES Structure

< >5.3 AES Transformation Functions

< >5.4 AES Key Expansion

< >5.5 An AES Example

< >5.6 AES Implementation

< >5.7 Recommended Reading

< >5.8 Key Terms, Review Questions, and Problems

Chapter 6 Block Cipher Operation

< >6.1 Multiple Encryption and Triple DES

< >6.2 Electronic Code book

< >6.3 Cipher Block Chaining Mode

< >6.4 Cipher Feedback Mode

< >6.5 Output Feedback Mode

< >6.6 Counter Mode

< >6.7 XTS-AES Mode for Block-Oriented Storage Devices

< >6.8 Recommended Reading

< >6.9 Key Terms, Review Questions, and Problems

< >Chapter 7 Pseudorandom Number Generation and Stream Ciphers

< >7.1 Principles of Pseudorandom Number Generation

< >7.2 Pseudorandom Number Generators

< >7.3 Pseudorandom Number Generation Using a Block Cipher

< >7.4 Stream Ciphers

< >7.5 RC4

< >7.6 True Random Number Generators

< >7.7 Recommended Reading

< >7.8 Key Terms, Review Questions, and Problems


Chapter 8 More Number Theory

< >8.1 Prime Numbers

< >8.2 Fermat


Availability
#
Location name is not set (Rak 000) 005.82 STA c
00000665dup
Available but not for loan - Missing
Detail Information
Series Title
null
Call Number
005.82 STA c
Publisher
New York : Pearson Education., 2014
Collation
xix, 731 hlm.; ilus.; 24 cm.
Language
English
ISBN/ISSN
9780133354690
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
Sixth Edition
Subject(s)
Computer security
Coding Theory
Computer networks--Security measures
Data Encryption (Computer Science)
Specific Detail Info
-
Statement of Responsibility
William Stallings
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?