ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cryptography and Network Security: Principles and Practice (5th Edition)

دانلود کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم)

Cryptography and Network Security: Principles and Practice (5th Edition)

مشخصات کتاب

Cryptography and Network Security: Principles and Practice (5th Edition)

دسته بندی: رمزنگاری
ویرایش: 5 
نویسندگان:   
سری:  
ISBN (شابک) : 0136097049, 9780136097044 
ناشر: Prentice Hall 
سال نشر: 2010 
تعداد صفحات: 900 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 8 مگابایت 

قیمت کتاب (تومان) : 34,000



کلمات کلیدی مربوط به کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم): علوم و مهندسی کامپیوتر، امنیت اطلاعات، رمزنگاری و رمزنگاری



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Cryptography and Network Security: Principles and Practice (5th Edition) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم)

این متن یک بررسی عملی از اصول و عملکرد رمزنگاری و امنیت شبکه ارائه می دهد.


توضیحاتی درمورد کتاب به خارجی

This text provides a practical survey of both the principles and practice of cryptography and network security.



فهرست مطالب

Cover
Title Page
Copyright
Contents
Notation
Preface
About the Author
Chapter 0 Reader’s Guide
	0.1 Outline of This Book
	0.2 A Roadmap for Readers and Instructors
	0.3 Internet and Web Resources
	0.4 Standards
Chapter 1 Overview
	1.1 Computer Security Concepts
	1.2 The OSI Security Architecture
	1.3 Security Attacks
	1.4 Security Services
	1.5 Security Mechanisms
	1.6 A Model for Network Security
	1.7 Recommended Reading and Web Sites
	1.8 Key Terms, Review Questions, and Problems
PART ONE: SYMMETRIC CIPHERS
	Chapter 2 Classical Encryption Techniques
		2.1 Symmetric Cipher Model
		2.2 Substitution Techniques
		2.3 Transposition Techniques
		2.4 Rotor Machines
		2.5 Steganography
		2.6 Recommended Reading and Web Sites
		2.7 Key Terms, Review Questions, and Problems
	Chapter 3 Block Ciphers and the Data Encryption Standard
		3.1 Block Cipher Principles
		3.2 The Data Encryption Standard (DES)
		3.3 A DES Example
		3.4 The Strength of DES
		3.5 Differential and Linear Cryptanalysis
		3.6 Block Cipher Design Principles
		3.7 Recommended Reading and Web Site
		3.8 Key Terms, Review Questions, and Problems
	Chapter 4 Basic Concepts in Number Theory and Finite Fields
		4.1 Divisibility and the Division Algorithm
		4.2 The Euclidean Algorithm
		4.3 Modular Arithmetic
		4.4 Groups, Rings, and Fields
		4.5 Finite Fields of the Form GF(p)
		4.6 Polynomial Arithmetic
		4.7 Finite Fields of the Form GF(2[sup(n)])
		4.8 Recommended Reading and Web Sites
		4.9 Key Terms, Review Questions, and Problems
		Appendix 4A: The Meaning of mod
	Chapter 5 Advanced Encryption Standard
		5.1 The Origins AES
		5.2 AES Structure
		5.3 AES Round Functions
		5.4 AES Key Expansion
		5.5 An AES Example
		5.6 AES Implementation
		5.7 Recommended Reading and Web Sites
		5.8 Key Terms, Review Questions, and Problems
		Appendix 5A: Polynomials with Coefficients in GF(2[sup(8)])
		Appendix 5B: Simplified AES
	Chapter 6 Block Cipher Operation
		6.1 Multiple Encryption and Triple DES
		6.2 Electronic Codebook Mode
		6.3 Cipher Block Chaining Mode
		6.4 Cipher Feedback Mode
		6.5 Output Feedback Mode
		6.6 Counter Mode
		6.7 XTS Mode for Block-Oriented Storage Devices
		6.8 Recommended Web Site
		6.9 Key Terms, Review Questions, and Problems
	Chapter 7 Pseudorandom Number Generation and Stream Ciphers
		7.1 Principles of Pseudorandom Number Generation
		7.2 Pseudorandom Number Generators
		7.3 Pseudorandom Number Generation Using a Block Cipher
		7.4 Stream Ciphers
		7.5 RC4
		7.6 True Random Numbers
		7.7 Recommended Reading
		7.8 Key Terms, Review Questions, and Problems
PART TWO: ASYMMETRIC CIPHERS
	Chapter 8 More Number Theory
		8.1 Prime Numbers¹
		8.2 Fermat’s and Euler’s Theorems
		8.3 Testing for Primality
		8.4 The Chinese Remainder Theorem
		8.5 Discrete Logarithms
		8.6 Recommended Reading and Web Sites
		8.7 Key Terms, Review Questions, and Problems
	Chapter 9 Public-Key Cryptography and RSA
		9.1 Principles of Public-Key Cryptosystems
		9.2 The RSA Algorithm
		9.3 Recommended Reading and Web Sites
		9.4 Key Terms, Review Questions, and Problems
		Appendix 9A: Proof of the RSA Algorithm
		Appendix 9B: The Complexity of Algorithms
	Chapter 10 Other Public-Key Cryptosystems
		10.1 Diffie-Hellman Key Exchange
		10.2 ElGamal Cryptosystem
		10.3 Elliptic Curve Arithmetic
		10.4 Elliptic Curve Cryptography
		10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher
		10.6 Recommended Reading and Web Sites
		10.7 Key Terms, Review Questions, and Problems
PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
	Chapter 11 Cryptographic Hash Functions
		11.1 Applications of Cryptographic Hash Functions
		11.2 Two Simple Hash Functions
		11.3 Requirements and Security
		11.4 Hash Functions Based on Cipher Block Chaining
		11.5 Secure Hash Algorithm (SHA)
		11.6 SHA-3
		11.7 Recommended Reading and Web Sites
		11.8 Key Terms, Review Questions, and Problems
		Appendix 11A: Mathematical Basis of Birthday Attack
	Chapter 12 Message Authentication Codes
		12.1 Message Authentication Requirements
		12.2 Message Authentication Functions
		12.3 Message Authentication Codes
		12.4 Security of MACs
		12.5 MACs Based on Hash Functions: HMAC
		12.6 MACs Based on Block Ciphers: DAA and CMAC
		12.7 Authenticated Encryption: CCM and GCM
		12.8 Pseudorandom Number Generation Using Hash Functions and MACs
		12.9 Recommended Reading
		12.10 Key Terms, Review Questions, and Problems
	Chapter 13 Digital Signatures
		13.1 Digital Signatures
		13.2 ElGamal Digital Signature Scheme
		13.3 Schnorr Digital Signature Scheme
		13.4 Digital Signature Standard (DSS)
		13.5 Recommended Reading and Web Sites
		13.6 Key Terms, Review Questions, and Problems
PART FOUR: MUTUAL TRUST
	Chapter 14 Key Management and Distribution
		14.1 Symmetric Key Distribution Using Symmetric Encryption
		14.2 Symmetric Key Distribution Using Asymmetric Encryption
		14.3 Distribution of Public Keys
		14.4 X.509 Certificates
		14.5 Public Key Infrastructure
		14.6 Recommended Reading and Web Sites
		14.7 Key Terms, Review Questions, and Problems
	Chapter 15 User Authentication Protocols
		15.1 Remote User Authentication Principles
		15.2 Remote User Authentication Using Symmetric Encryption
		15.3 Kerberos
		15.4 Remote User Authentication Using Asymmetric Encryption
		15.5 Federated Identity Management
		15.6 Recommended Reading and Web Sites
		15.7 Key Terms, Review Questions, and Problems
		Appendix 15A: Kerberos Encryption Techniques
PART FIVE: NETWORK AND INTERNET SECURITY
	Chapter 16 Transport-Level Security
		16.1 Web Security Issues
		16.2 Secure Sockets Layer (SSL)
		16.3 Transport Layer Security (TLS)
		16.4 HTTPS
		16.5 Secure Shell (SSH)
		16.6 Recommended Reading and Web Sites
		16.7 Key Terms, Review Questions, and Problems
	Chapter 17 Wireless Network Security
		17.1 IEEE 802.11 Wireless LAN Overview
		17.2 IEEE 802.11i Wireless LAN Security
		17.3 Wireless Application Protocol Overview
		17.4 Wireless Transport Layer Security
		17.5 WAP End-to-End Security
		17.6 Recommended Reading and Web Sites
		17.7 Key Terms, Review Questions, and Problems
	Chapter 18 Electronic Mail Security
		18.1 Pretty Good Privacy (PGP)
		18.2 S/MIME
		18.3 DomainKeys Identified Mail (DKIM)
		18.4 Recommended Web Sites
		18.5 Key Terms, Review Questions, and Problems
		Appendix 18A: Radix-64 Conversion
	Chapter 19 IP Security
		19.1 IP Security Overview
		19.2 IP Security Policy
		19.3 Encapsulating Security Payload
		19.4 Combining Security Associations
		19.5 Internet Key Exchange
		19.6 Cryptographic Suites
		19.7 Recommended Reading and Web Sites
		19.8 Key Terms, Review Questions, and Problems
APPENDICES
	Appendix A: Projects for Teaching Cryptography and Network Security
		A.1 Sage Computer Algebra Projects
		A.2 Hacking Project
		A.3 Block Cipher Projects
		A.4 Laboratory Exercises
		A.5 Research Projects
		A.6 Programming Projects
		A.7 Practical Security Assessments
		A.8 Writing Assignments
		A.9 Reading/Report Assignments
	Appendix B: Sage Examples
		B.1 Chapter 2: Classical Encryption Techniques
		B.2 Chapter 3: Block Ciphers and the Data Encryption Standard
		B.3 Chapter 4: Basic Concepts in Number Theory and Finite Fields
		B.4 Chapter 5: Advanced Encryption Standard
		B.5 Chapter 6: Pseudorandom Number Generation and Stream Ciphers
		B.6 Chapter 8: Number Theory
		B.6 Chapter 9: Public-Key Cryptography and RSA
		B.7 Chapter 10: Other Public-Key Cryptosystems
		B.8 Chapter 11: Cryptographic Hash Functions
		B.9 Chapter 13: Digital Signatures
References
Index
	A
	B
	C
	D
	E
	F
	G
	H
	I
	K
	L
	M
	N
	O
	P
	Q
	R
	S
	T
	U
	V
	W
	X
PART SIX: SYSTEM SECURITY
	Chapter 20 Intruders
		20.1 Intruders
		20.2 Intrusion Detection
		20.3 Password Management
		20.4 Recommended Reading and Web Sites
		20.5 Key Terms, Review Questions, and Problems
		Appendix 20A: The Base-Rate Fallacy
	Chapter 21 Malicious Software
		21.1 Types of Malicious Software
		21.2 Viruses
		21.3 Virus Countermeasures
		21.4 Worms
		21.5 Distributed Denial of Service Attacks
		21.6 Recommended Reading and Web Sites
		21.7 Key Terms, Review Questions, and Problems
	Chapter 22 Firewalls
		22.1 The Need for Firewalls
		22.2 Firewall Characteristics
		22.3 Types of Firewalls
		22.4 Firewall Basing
		22.5 Firewall Location and Configurations
		22.6 Recommended Reading and Web Sites
		22.7 Key Terms, Review Questions, and Problems
PART SEVEN: LEGAL AND ETHICAL ISSUES
	Chapter 23 Legal and Ethical Issues
		23.1 Cybercrime and Computer Crime
		23.2 Intellectual Property
		23.3 Privacy
		23.4 Ethical Issues
		23.5 Recommended Reading and Web Sites
		23.6 Key Terms, Review Questions, and Problems
Appendix C: Sage Problems
	C.1 Getting Started with Sage
	C.2 Programming with Sage
	C.3 Chapter 2: Classical Encryption Techniques
	C.4 Chapter 3: Block Ciphers and the Data Encryption Standard
	C.5 Chapter 4: Basic Concepts in Number Theory and Finite Fields
	C.6 Chapter 5: Advanced Encryption Standard
	C.7 Chapter 7: Pseudorandom Number Generation and Stream Ciphers
	C.8 Chapter 8: Number Theory
	C.9 Chapter 9: Public-Key Cryptography and RSA
	C.10 Chapter 10: Other Public-Key Cryptosystems
	C.11 Chapter 11: Cryptographic Hash Functions
	C.12 Chapter 13: Digital Signatures
Glossary
	A
	B
	C
	D
	E
	F
	G
	H
	I
	K
	L
	M
	N
	O
	P
	R
	S
	T
	U
	V
	W
	Z




نظرات کاربران