Cryptography and Network Security - Principles and Practice (3rd Edition)(Chinese Edition)(Old-Used)
LIU YU ZHEN / YI
Used - Soft cover
Seller accepted payment methods
- PayPal
- Bank/Wire Transfer
Quantity: 1 available
Add to basketSeller accepted payment methods
Quantity: 1 available
Add to basketAbout this Item
Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pub Date :2004-01-01 Publisher: Electronic Industry Press ------------------------------------ -------------------------------------- [genuine second-hand quality assurance] Cryptography and Network Security - Principles and Practice (third edition) A bid the translated Revision -1-1 Press: Publishing House of Electronics Industry Folio: 16 Pages: 494ISBN: 9787505393950 Weight: 814 g library compiled: F2526 Pricing: 49.00 yuan now Price: 19.60 yuan --------------------------------------------- ----------------------------- Description: This book is a systematic introduction to the basic principles and applications of technology in the Cryptography and Network Security . The book includes the following four parts. The traditional password part of the traditional cryptographic algorithms and design principles discussed in detail. including the use of traditional password to ensure secrecy. Public key cryptography and hash function is part of the public-key cryptographic algorithms and design principles discussed in detail. message authentication codes and hash function applications. as well as digital signature and public key certificate. Network Security section discusses the system layer of security issues. including the threat posed by the intruders and viruses and the corresponding countermeasures. firewalls and trusted systems application. Book is the third edition of the second edition. Cryptography and network security field continues to cover a broad range of content at the same time. a new finite field. the Advanced Encryption Standard (AES). RC4 password. CTR mode and part of Elliptic Curve Cryptography has done a lot of expansion. In addition. the basic content about many changes and updates. The book is comprehensive. about easy to understand. easy to understand. especially suitable for classroom teaching and self-learning. is a rare books. Network security is discussed later in this book in the real world. has been achieved and the practical application of being used to provide network security. The book can serve as graduate and advanced undergraduate textbook. the field of scientific and technical personnel engaged in information security. computer. communications. electronics engineering are also available for reference. -------------------------------------------------- ------------------------ directory: Chapter 1 Introduction 1.1 services. mechanisms and attack 1.2 OSI security framework 1.3 Network Security Model 1.4 book Overview 1.5 Recommended traditional encryption technology 2.1 symmetric cryptography model in the first part of the reading materials 1.6 Internet and Web resources symmetric cryptography Chapter 2 2.2 substitution technology 2.3 Replacement Technology 2.4 wheel machine 2.5 Steganography 2.6 Recommended Reading and Web Site 2.7 Key Terms. Questions and Exercises 3 block cipher Data Encryption Standard 3.1 3.3 Data Encryption Standard simplify DES3.2 block cipher principles intensity of 3.4 DES 3.5 differential analysis and linear analysis of the operating mode of the block cipher 3.6 block cipher design principle 3.7 3.8 Recommended Reading 3.9 key terms. Questions. and Problems Chapter 4 finite field 4.1 group. ring and domain 4.2 modular arithmetic 4.3 Euclid algorithm 4.4 finite field GF (p) 4.5 Polynomials 4.6 finite field GF (2n) 4.7 Recommended Reading and Web Site 4.8 key terms. thinking Questions. and Problems Chapter 5 Advanced Encryption Standard 5.1 Advanced Encryption standard assessment criteria 5.2 AES Password 5.3 Recommended Reading and URLs 5.4 key terms. think about the questions and exercises Appendix 5A coefficient symmetric cryptography in GF (Chapter 6 of 28) in the polynomial 6.1 Triple DES algorithm 6.2 Blowfish algorithm 6.3 RC5 algorithm the 6.4 advanced symmetric block cipher Features 6.5 RC4 stream password 6.6 Recommended Reading and Web Site 6.7 Key Terms. Qu. Seller Inventory # FB049344
Bibliographic Details
Title: Cryptography and Network Security - ...
Publisher: Publishing House
Publication Date: 2000
Binding: paperback
Condition: Good
Store Description
We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...
More InformationMost orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.
Payment Methods
accepted by seller
You can pay with your credit card on AbeBooks.com.