Search:

Cryptography and Network Security

Format Post in Programming BY William Stallings

0131873164 Shared By Guest

Cryptography and Network Security William Stallings is available to download <table><tr><td colspan="2"><strong style="font-size:1.This material is available do download at niSearch.com on William Stallings's eBooks, 2em;">Cryptography and Network Security</strong><br/>William Stallings</td></tr> <tr> <td><b>Type:</b></td> <td>eBook</td> </tr> <tr> <td><b>Released:</b></td> <td>2005</td> </tr> <tr> <td><b>Publisher:</b></td> <td>Prentice Hall</td> </tr> <tr> <td><b>Page Count:</b></td> <td>592</td> </tr> <tr> <td><b>Format:</b></td> <td>pdf</td> </tr> <tr> <td><b>Language:</b></td> <td>English</td> </tr> <tr> <td><b>ISBN-10:</b></td> <td>0131873164</td> </tr> </table> In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount.Cryptography and Network Security Textbook This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.

Comments (0)

Currently,no comments for this book!