Cryptography and network security: principles and practice
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Upper Saddle River, N.J.
Prentice Hall
2003
|
Ausgabe: | 3. ed., internat. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIV, 681 S. graph. Darst. |
ISBN: | 0131115022 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV019301013 | ||
003 | DE-604 | ||
005 | 20050817 | ||
007 | t | ||
008 | 040519s2003 d||| |||| 00||| eng d | ||
020 | |a 0131115022 |9 0-13-111502-2 | ||
035 | |a (OCoLC)50402963 | ||
035 | |a (DE-599)BVBBV019301013 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-92 |a DE-29T |a DE-355 |a DE-573 |a DE-83 |a DE-11 | ||
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 68P25 |2 msc | ||
084 | |a 94A60 |2 msc | ||
084 | |a 68M10 |2 msc | ||
100 | 1 | |a Stallings, William |d 1945- |e Verfasser |0 (DE-588)130436461 |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |b principles and practice |c William Stallings |
246 | 1 | 3 | |a Network and internetwork security |
250 | |a 3. ed., internat. ed. | ||
264 | 1 | |a Upper Saddle River, N.J. |b Prentice Hall |c 2003 | |
300 | |a XIV, 681 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012769257&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-012769257 |
Datensatz im Suchindex
_version_ | 1804132709335826432 |
---|---|
adam_text | CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE THIRD EDITION
WILLIAM STALLINGS PRENTICE HALL PEARSON EDUCATION INTERNATIONAL CONTENTS
CHAPTER 1 OVERVIEW 1 1.1 SERVICES. MECHANISMS AND TTNCKS 4 1.2 THE OSL
SECURITY ARCHITECTURE 7 1.3 A MODEL FOR NETWORK SECURITY 14 1.4 OUTLINE
OF THIS BOOK 17 1.5 RECOMMENDED READING 17 1.6 FNTERNEL AND WEB
RESOURCES 18 PART ONE SYMMETRIC CIPHERS 21 CHAPTER 2 CLASSICAL
ENCRYPTION TECHNIQUES 23 L.L 2.2 2.3 2.4 2.5 2.6 2.7 SYMMETRIC CIPHER
MODEL 24 SUBSTITUTION TECHNIQUES 30 ! RANSPOSITION I ECHNIQUES 44 ROTOR
MACHINES 46 STEGANOGRAPHY 47 RECOMMENDED READING AND WEB SITES 49 KEY
TERMS, REVIEW QUESTIONS, AND PROBLEMS 50 CHAPTER 3 BLOCK CIPHERS AND THE
DATA ENCRYPTION STANDARD 55 M 3.1 SIMPLIFIED DES 56 3.2 BLOCK CIPHER
PRINCIPLES 63 3.3 THE DATA ENCRYPTION STANDARD 72 3.4 THE STRENGTH OF
DES 82 3.5 DIFFERENTIAL AND LINEAR CRYPTANALYSIS 83 3.6 BLOCK CIPHER
DESIGN PRINCIPLES S6 3.7 BLOCK CIPHER MODES OF OPERATION 90 3.8
RECOMMENDED READING 98 3.9 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS 99
VI CONTENTS CHAPTER 4 INTRODUCTION TO FINITE FIELDS 103 4.1 GROUPS,
RINGS, AND FIELDS 104 4.2 MODULAR ARITHMETIC 107 4.3 EUCLID S ALGORITHM
115 4.4 FINITE FIELDS OF THE FORM GF(P) 117 4.5 POLYNOMIAL ARITHMETIC
121 4.6 FINITE FIELDS OF THE FORM GF(2 ) 126 4.7 RECOMMENDED READING AND
WEB SITES 134 4.8 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS 134 CHAPTER
5 ADVANCED ENCRYPTION STANDARD 139 5.1 EVALUATION CRITERIA FOR AES 140
5.2 THE AES CIPHER 143 5.3 RECOMMENDED READING AND WEB SITES 167 5.4 KEY
TERMS, REVIEW QUESTIONS, AND PROBLEMS 167 APPENDIX 5A POLYNOMIALS WITH
COEFFICIENTS IN GF(2 8 ) 169 CHAPTER 6 CONTEMPORARY SYMMETRIC CIPHERS
173 6.1 TRIPLE DES 174 6.2 BLOWFISH 179 6.3 RC5 185 6.4 CHARACTERISTICS
OF ADVANCED SYMMETRIC BLOCK CIPHERS 190 6.5 RC4 STREAM CIPER 192 6.6
RECOMMENDED READING AND WEB SITES 197 6.7 KEY TERMS, REVIEW QUESTIONS,
AND PROBLEMS 197 CHAPTER 7 CONFIDENTIALITY USING SYMMETRIC ENCRYPTION
201 7.1 PLACEMENT OF ENCRYPTION FUNCTION 202 7.2 TRAFFIC CONFIDENTIALITY
210 7.3 KEY DISTRIBUTION 211 7.4 RANDOM NUMBER GENERATION 220 7.5
RECOMMENDED READING AND WEB SITE 227 7.6 KEY TERMS, REVIEW QUESTIONS,
AND PROBLEMS 228 PART TWO PUBLIC-KEY ENCRYPTION AND HASH FUNCTIONS 233
CHAPTER 8 INTRODUCTION TO NUMBER THEORY 235 8.1 PRIME NUMBERS 236 8.2
FERMAT S AND EULER S THEOREMS 239 CONTENTS VII 8.3 TESTING FOR PRIMALITY
243 8.4 THE CHINESE REMAINDER THEOREM 245 8.5 DISCRETE LOGARITHMS 248
8.6 RECOMMENDED READING AND WEB SITE 252 8.7 KEY TERMS, REVIEW
QUESTIONS, AND PROBLEMS 253 CHAPTER 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA
257 9.1 PRINCIPLES OF PUBLIC-KEY CRYPTOSYSTEMS 259 9.2 THE RSA ALGORITHM
268 9.3 RECOMMENDED READING AND WEB SITE 278 9.4 KEY TERMS, REVIEW
QUESTIONS, AND PROBLEMS 279 APPENDIX 9A THE COMPLEXITY OF ALGORITHMS 282
CHAPTER 10 KEY MANAGEMENT; OTHER PUBLIC-KEY CRYPTOSYSTEMS 285 10.1 KEY
MANAGEMENT 286 10.2 DIFFIE-HELLMAN KEY EXCHANGE 293 10.3 ELLIPTIC CURVE
ARITHMETIC 297 10.4 ELLIPTIC CURVE CRYPTOGRAPHY 304 10.5 RECOMMENDED
READING AND WEB SITE 308 10.6 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS
308 CHAPTER 11 MESSAGE AUTHENTICATION AND HASH FUNCTIONS 311 11.1
AUTHENTICATION REQUIREMENTS 312 11.2 AUTHENTICATION FUNCTIONS 313 11.3
MESSAGE AUTHENTICATION CODES 324 11.4 HASH FUNCTIONS 328 11.5 SECURITY
OF HASH FUNCTIONS AND MACS 335 11.6 RECOMMENDED READING 338 11.7 KEY
TERMS, REVIEW QUESTIONS, AND PROBLEMS 339 APPENDIX IIA MATHEMATICAL
BASIS OF THE BIRTHDAY ATTACK 340 CHAPTER 12 HASH ALGORITHMS 347 12.1 MD5
MESSAGE DIGEST ALGORITHM 348 12.2 SECURE HASH ALGORITHM 357 12.3
RIPEMD-160 365 12.4 HMAC 372 12.5 RECOMMENDED READING AND WEB SITES 377
12.6 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS 377 CONTENTS IX CHAPTER
17 WEB SECURITY 527 17.1 WEB SECURITY CONSIDERATIONS 528 17.2 SECURE
SOCKETS LAYER AND TRANSPORT LAYER SECURITY 531 17.3 SECURE ELECTRONIC
TRANSACTION 548 17.4 RECOMMENDED READING AND WEB SITES 560 17.5 KEY
TERMS, REVIEW QUESTIONS, AND PROBLEMS 560 PART FOUR SYSTEM SECURITY 563
CHAPTER 18 INTRUDERS 565 18.1 INTRUDERS 566 18.2 INTRUSION DETECTION 569
18.3 PASSWORD MANAGEMENT 581 18.4 RECOMMENDED READING AND WEB SITES 591
18.5 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS 592 APPENDIX 18A THE
BASE-RATE FALLACY 594 CHAPTER 19 MALICIOUS SOFTWARE 597 19.1 VIRUSES AND
RELATED THREATS 598 19.2 VIRUS COUNTERMEASURES 609 19.3 RECOMMENDED
READING AND WEB SITE 613 19.4 KEY TERMS, REVIEW QUESTIONS, AND PROBLEMS
614 CHAPTER 20 FIREWALLS 615 20.1 FIREWALL DESIGN PRINCIPLES 616 20.2
TRUSTED SYSTEMS 628 20.3 RECOMMENDED READING AND WEB SITE 634 20.4 KEY
TERMS, REVIEW QUESTIONS, AND PROBLEMS 634 APPENDICES APPENDIX A
STANDARDS AND STANDARDS-SETTING ORGANIZATIONS 637 A.L THE IMPORTANCE OF
STANDARDS 638 A.2 STANDARDS AND REGULATION 639 A.3 INTERNET STANDARDS
AND THE INTERNET SOCIETY 640 A.4 NATIONAL INSTITUTE OF STANDARDS AND
TECHNOLOGY 634 A.5 STANDARDS AND SPECIFICATIONS CITED IN THIS BOOK 644 X
CONTENTS APPENDIX * PROJECTS FOR TEACHING CRYPTOGRAPHY AND NETWORK
SECURITY 647 B.L RESEARCH PROJECTS 648 B.2 PROGRAMMING PROJECTS 649 B.3
READING/REPORT ASSIGNMENTS 649 GXOSSARY 651 REFERENCES 657 INDEX 670
|
any_adam_object | 1 |
author | Stallings, William 1945- |
author_GND | (DE-588)130436461 |
author_facet | Stallings, William 1945- |
author_role | aut |
author_sort | Stallings, William 1945- |
author_variant | w s ws |
building | Verbundindex |
bvnumber | BV019301013 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)50402963 (DE-599)BVBBV019301013 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 3. ed., internat. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01785nam a2200457 c 4500</leader><controlfield tag="001">BV019301013</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20050817 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">040519s2003 d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0131115022</subfield><subfield code="9">0-13-111502-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)50402963</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV019301013</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68P25</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">68M10</subfield><subfield code="2">msc</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stallings, William</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)130436461</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="b">principles and practice</subfield><subfield code="c">William Stallings</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Network and internetwork security</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">3. ed., internat. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Prentice Hall</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 681 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012769257&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-012769257</subfield></datafield></record></collection> |
id | DE-604.BV019301013 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:57:08Z |
institution | BVB |
isbn | 0131115022 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-012769257 |
oclc_num | 50402963 |
open_access_boolean | |
owner | DE-703 DE-92 DE-29T DE-355 DE-BY-UBR DE-573 DE-83 DE-11 |
owner_facet | DE-703 DE-92 DE-29T DE-355 DE-BY-UBR DE-573 DE-83 DE-11 |
physical | XIV, 681 S. graph. Darst. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Prentice Hall |
record_format | marc |
spelling | Stallings, William 1945- Verfasser (DE-588)130436461 aut Cryptography and network security principles and practice William Stallings Network and internetwork security 3. ed., internat. ed. Upper Saddle River, N.J. Prentice Hall 2003 XIV, 681 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Internet (DE-588)4308416-3 s Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s DE-604 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012769257&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Stallings, William 1945- Cryptography and network security principles and practice Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4308416-3 (DE-588)4033329-2 (DE-588)4070085-9 |
title | Cryptography and network security principles and practice |
title_alt | Network and internetwork security |
title_auth | Cryptography and network security principles and practice |
title_exact_search | Cryptography and network security principles and practice |
title_full | Cryptography and network security principles and practice William Stallings |
title_fullStr | Cryptography and network security principles and practice William Stallings |
title_full_unstemmed | Cryptography and network security principles and practice William Stallings |
title_short | Cryptography and network security |
title_sort | cryptography and network security principles and practice |
title_sub | principles and practice |
topic | Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computersicherheit Internet Kryptologie Rechnernetz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=012769257&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stallingswilliam cryptographyandnetworksecurityprinciplesandpractice AT stallingswilliam networkandinternetworksecurity |