正在加载图片...
◆PREY NEXT◆ Cryptography and Network Security Principles and Practices,Fourth Edition By William Stallings Publisher:Prentice Hall Pub Date:November 16,2005 Print1SBN-10:0-13-187316-4 Print1SBN-13:978-0-13-187316-2 eText ISBN.-10:0-13-187319-9 ·Table of Contents eText1SBN-13:978-0-13-187319-3 ·Index Pages:592 Copyright Notation Preface Objectives Intended Audience Plan of the Book Internet Services for Instructors and Students Projects for Teaching Cryptography and Network Security What's New in the Fourth Edition Acknowledgments Chapter 0.Reader's Guide Section 0.1.Outline of this Book Section 0.2.Roadmap Section 0.3.Internet and Web Resources Chapter 1.Introduction 122469 Section 1.1.Security Trends Section 1.2.The OSI Security Architecture Section 1.3.Security Attacks Section 1.4.Security Services Section 1.5.Security Mechanisms Section 1.6.A Model for Network Security Section 1.7.Recommended Reading and Web Sites Section 1.8.Key Terms.Review Questions,and Problems Part One:Symmetric Ciphers Chapter 2.Classical Encryption Techniques Section 2.1.Symmetric Cipher Model Section 2.2.Substitution Techniques Section 2.3.Transposition Techniques Section 2.4.Rotor Machines Section 2.5.Steganography 236924503059135624 Section 2.6.Recommended Reading and Web Sites Section 2.7.Key Terms.Review Questions,and Problems Chapter 3.Block Ciphers and the Data Encryption Standard Section 3.1.Block Cipher Principles• Table of Contents • Index Cryptography and Network Security Principles and Practices, Fourth Edition By William Stallings Publisher: Prentice Hall Pub Date: November 16, 2005 Print ISBN-10: 0-13-187316-4 Print ISBN-13: 978-0-13-187316-2 eText ISBN-10: 0-13-187319-9 eText ISBN-13: 978-0-13-187319-3 Pages: 592 Copyright Notation xi Preface xiii Objectives xiii Intended Audience xiii Plan of the Book xiv Internet Services for Instructors and Students xiv Projects for Teaching Cryptography and Network Security xiv What's New in the Fourth Edition xv Acknowledgments xvi Chapter 0. Reader's Guide 1 Section 0.1. Outline of this Book 2 Section 0.2. Roadmap 2 Section 0.3. Internet and Web Resources 4 Chapter 1. Introduction 6 Section 1.1. Security Trends 9 Section 1.2. The OSI Security Architecture 12 Section 1.3. Security Attacks 13 Section 1.4. Security Services 16 Section 1.5. Security Mechanisms 19 Section 1.6. A Model for Network Security 22 Section 1.7. Recommended Reading and Web Sites 24 Section 1.8. Key Terms, Review Questions, and Problems 25 Part One: Symmetric Ciphers 26 Chapter 2. Classical Encryption Techniques 28 Section 2.1. Symmetric Cipher Model 30 Section 2.2. Substitution Techniques 35 Section 2.3. Transposition Techniques 49 Section 2.4. Rotor Machines 51 Section 2.5. Steganography 53 Section 2.6. Recommended Reading and Web Sites 55 Section 2.7. Key Terms, Review Questions, and Problems 56 Chapter 3. Block Ciphers and the Data Encryption Standard 62 Section 3.1. Block Cipher Principles 64
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有