Verwandte Artikel zu 密码编码学与网...

密码编码学与网络安全原理与实践 第三版 William St - Softcover

 
9787505393950: 密码编码学与网络安全原理与实践 第三版 William St

Gebraucht kaufen

Zustand: Befriedigend
Ship out in 2 business day, And...
Diesen Artikel anzeigen

EUR 12,73 für den Versand von China nach Deutschland

Versandziele, Kosten & Dauer

Suchergebnisse für 密码编码学与网...

Beispielbild für diese ISBN

LIU YU ZHEN / YI
Verlag: Publishing House, 2000
ISBN 10: 7505393952 ISBN 13: 9787505393950
Gebraucht paperback

Anbieter: liu xing, Nanjing, JS, China

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

paperback. Zustand: Good. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pub Date :2004-01-01 Publisher: Electronic Industry Press ------------------------------------ -------------------------------------- [genuine second-hand quality assurance] Cryptography and Network Security - Principles and Practice (third edition) A bid the translated Revision -1-1 Press: Publishing House of Electronics Industry Folio: 16 Pages: 494ISBN: 9787505393950 Weight: 814 g library compiled: F2526 Pricing: 49.00 yuan now Price: 19.60 yuan --------------------------------------------- ----------------------------- Description: This book is a systematic introduction to the basic principles and applications of technology in the Cryptography and Network Security . The book includes the following four parts. The traditional password part of the traditional cryptographic algorithms and design principles discussed in detail. including the use of traditional password to ensure secrecy. Public key cryptography and hash function is part of the public-key cryptographic algorithms and design principles discussed in detail. message authentication codes and hash function applications. as well as digital signature and public key certificate. Network Security section discusses the system layer of security issues. including the threat posed by the intruders and viruses and the corresponding countermeasures. firewalls and trusted systems application. Book is the third edition of the second edition. Cryptography and network security field continues to cover a broad range of content at the same time. a new finite field. the Advanced Encryption Standard (AES). RC4 password. CTR mode and part of Elliptic Curve Cryptography has done a lot of expansion. In addition. the basic content about many changes and updates. The book is comprehensive. about easy to understand. easy to understand. especially suitable for classroom teaching and self-learning. is a rare books. Network security is discussed later in this book in the real world. has been achieved and the practical application of being used to provide network security. The book can serve as graduate and advanced undergraduate textbook. the field of scientific and technical personnel engaged in information security. computer. communications. electronics engineering are also available for reference. -------------------------------------------------- ------------------------ directory: Chapter 1 Introduction 1.1 services. mechanisms and attack 1.2 OSI security framework 1.3 Network Security Model 1.4 book Overview 1.5 Recommended traditional encryption technology 2.1 symmetric cryptography model in the first part of the reading materials 1.6 Internet and Web resources symmetric cryptography Chapter 2 2.2 substitution technology 2.3 Replacement Technology 2.4 wheel machine 2.5 Steganography 2.6 Recommended Reading and Web Site 2.7 Key Terms. Questions and Exercises 3 block cipher Data Encryption Standard 3.1 3.3 Data Encryption Standard simplify DES3.2 block cipher principles intensity of 3.4 DES 3.5 differential analysis and linear analysis of the operating mode of the block cipher 3.6 block cipher design principle 3.7 3.8 Recommended Reading 3.9 key terms. Questions. and Problems Chapter 4 finite field 4.1 group. ring and domain 4.2 modular arithmetic 4.3 Euclid algorithm 4.4 finite field GF (p) 4.5 Polynomials 4.6 finite field GF (2n) 4.7 Recommended Reading and Web Site 4.8 key terms. thinking Questions. and Problems Chapter 5 Advanced Encryption Standard 5.1 Advanced Encryption standard assessment criteria 5.2 AES Password 5.3 Recommended Reading and URLs 5.4 key terms. think about the questions and exercises Appendix 5A coefficient symmetric cryptography in GF (Chapter 6 of 28) in the polynomial 6.1 Triple DES algorithm 6.2 Blowfish algorithm 6.3 RC5 algorithm the 6.4 advanced symmetric block cipher Features 6.5 RC4 stream password 6.6 Recommended Reading and Web Site 6.7 Key Terms. Qu. Bestandsnummer des Verkäufers FB049344

Verkäufer kontaktieren

Gebraucht kaufen

EUR 46,31
Währung umrechnen
Versand: EUR 12,73
Von China nach Deutschland
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb