Artículos relacionados a 密码编码学与网...

密码编码学与网络安全原理与实践 第三版 William St - Tapa blanda

 
9787505393950: 密码编码学与网络安全原理与实践 第三版 William St

Comprar usado

Condición: Aceptable
Ship out in 2 business day, And...
Ver este artículo

EUR 12,74 gastos de envío desde China a España

Destinos, gastos y plazos de envío

Resultados de la búsqueda para 密码编码学与网...

Imagen de archivo

LIU YU ZHEN / YI
Publicado por Publishing House, 2000
ISBN 10: 7505393952 ISBN 13: 9787505393950
Antiguo o usado paperback

Librería: liu xing, Nanjing, JS, China

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

paperback. Condición: Good. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pub Date :2004-01-01 Publisher: Electronic Industry Press ------------------------------------ -------------------------------------- [genuine second-hand quality assurance] Cryptography and Network Security - Principles and Practice (third edition) A bid the translated Revision -1-1 Press: Publishing House of Electronics Industry Folio: 16 Pages: 494ISBN: 9787505393950 Weight: 814 g library compiled: F2526 Pricing: 49.00 yuan now Price: 19.60 yuan --------------------------------------------- ----------------------------- Description: This book is a systematic introduction to the basic principles and applications of technology in the Cryptography and Network Security . The book includes the following four parts. The traditional password part of the traditional cryptographic algorithms and design principles discussed in detail. including the use of traditional password to ensure secrecy. Public key cryptography and hash function is part of the public-key cryptographic algorithms and design principles discussed in detail. message authentication codes and hash function applications. as well as digital signature and public key certificate. Network Security section discusses the system layer of security issues. including the threat posed by the intruders and viruses and the corresponding countermeasures. firewalls and trusted systems application. Book is the third edition of the second edition. Cryptography and network security field continues to cover a broad range of content at the same time. a new finite field. the Advanced Encryption Standard (AES). RC4 password. CTR mode and part of Elliptic Curve Cryptography has done a lot of expansion. In addition. the basic content about many changes and updates. The book is comprehensive. about easy to understand. easy to understand. especially suitable for classroom teaching and self-learning. is a rare books. Network security is discussed later in this book in the real world. has been achieved and the practical application of being used to provide network security. The book can serve as graduate and advanced undergraduate textbook. the field of scientific and technical personnel engaged in information security. computer. communications. electronics engineering are also available for reference. -------------------------------------------------- ------------------------ directory: Chapter 1 Introduction 1.1 services. mechanisms and attack 1.2 OSI security framework 1.3 Network Security Model 1.4 book Overview 1.5 Recommended traditional encryption technology 2.1 symmetric cryptography model in the first part of the reading materials 1.6 Internet and Web resources symmetric cryptography Chapter 2 2.2 substitution technology 2.3 Replacement Technology 2.4 wheel machine 2.5 Steganography 2.6 Recommended Reading and Web Site 2.7 Key Terms. Questions and Exercises 3 block cipher Data Encryption Standard 3.1 3.3 Data Encryption Standard simplify DES3.2 block cipher principles intensity of 3.4 DES 3.5 differential analysis and linear analysis of the operating mode of the block cipher 3.6 block cipher design principle 3.7 3.8 Recommended Reading 3.9 key terms. Questions. and Problems Chapter 4 finite field 4.1 group. ring and domain 4.2 modular arithmetic 4.3 Euclid algorithm 4.4 finite field GF (p) 4.5 Polynomials 4.6 finite field GF (2n) 4.7 Recommended Reading and Web Site 4.8 key terms. thinking Questions. and Problems Chapter 5 Advanced Encryption Standard 5.1 Advanced Encryption standard assessment criteria 5.2 AES Password 5.3 Recommended Reading and URLs 5.4 key terms. think about the questions and exercises Appendix 5A coefficient symmetric cryptography in GF (Chapter 6 of 28) in the polynomial 6.1 Triple DES algorithm 6.2 Blowfish algorithm 6.3 RC5 algorithm the 6.4 advanced symmetric block cipher Features 6.5 RC4 stream password 6.6 Recommended Reading and Web Site 6.7 Key Terms. Qu. Nº de ref. del artículo: FB049344

Contactar al vendedor

Comprar usado

EUR 46,35
Convertir moneda
Gastos de envío: EUR 12,74
De China a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito