Cryptography & Network Security: Principles & Practice, 2/e (精裝)
William Stallings
- 出版商: Prentice Hall
- 出版日期: 1999-04-30
- 售價: $1,009
- 語言: 英文
- 頁數: 569
- 裝訂: Hardcover
- ISBN: 0138690170
- ISBN-13: 9780138690175
-
相關分類:
資訊安全
無法訂購
買這商品的人也買了...
-
$1,100$1,078 -
$1,205TCP/IP Illustrated, Volume 1: The Protocols (Hardcover)
-
$665Introduction to the Theory of Computation
-
$1,045UNIX Network Programming, Volume 1, 2/e (精裝)
-
$1,200$1,176 -
$998The Unified Modeling Language User Guide
-
$998Fundamentals of Data Structures in C
-
$1,045Discrete and Combinatorial Mathematics: An Applied Introduction, 4/e (精裝)
-
$1,090$1,068 -
$2,440$2,318 -
$2,790$2,651 -
$960An Introduction to Formal Languages and Automata, 3/e
-
$1,540$1,463 -
$998Operating System Concepts, 6/e
-
$1,045Java How to Program, 4/e
-
$1,000$950 -
$970Introduction to Algorithms, 2/e
-
$1,330$1,260 -
$1,150$1,127 -
$1,575$1,496 -
$1,045Database Systems: A Practical Approach to Design, Implementation, 3/e
-
$1,700$1,615 -
$2,450$2,328 -
$3,120$2,964 -
$1,235Computer Architecture: A Quantitative Approach, 3/e(精裝本)
商品描述
Summary
86901-6
As we enter the age of universal electronic connectivity in which viruses, hackers, electronic eavesdropping, and electronic fraud can threaten the prosperity and productivity of corporations and individuals, security is increasingly important. Fortunately, the disciplines of cryptography and network security have matured, leading to the development of practical, available applications to enforce network security.
Best-selling author and two-time winner of the TEXTY award for the best computer science and engineering text, William Stallings provides a practical survey of both the principles and practice of cryptography and network security.
Extensively reorganized to provide the optimal sequence for classroom instruction and self-study, the second edition includes these key features.
- Looks at system-level security issues, including the threat of and countermeasures for intruders and viruses, and the use of firewalls and trusted systems.
- NEW - Discussion of block cipher design principles, plus coverage of Blowfish, CAST-128, Triple DES, and other algorithms
- NEW - Chapters on IP security and Web security
- Expanded coverage of public-key encryption algorithms and design principles, including RSA and elliptic curve cryptography
- Covers important network security tools and applications, including Kerberos, X.509v3, PGP, S/MIME, IP security, SSL/TLS, and SET
- On-line transparency masters, an Internet mailing list, and links to relevant web sites are available to http://www.shore.net/~ws/Security2e.html