دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: رمزنگاری ویرایش: 5 نویسندگان: William Stallings سری: ISBN (شابک) : 0136097049, 9780136097044 ناشر: Prentice Hall سال نشر: 2010 تعداد صفحات: 900 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 8 مگابایت
کلمات کلیدی مربوط به کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم): علوم و مهندسی کامپیوتر، امنیت اطلاعات، رمزنگاری و رمزنگاری
در صورت تبدیل فایل کتاب Cryptography and Network Security: Principles and Practice (5th Edition) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب رمزنگاری و امنیت شبکه: اصول و تمرین (ویرایش پنجم) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این متن یک بررسی عملی از اصول و عملکرد رمزنگاری و امنیت شبکه ارائه می دهد.
This text provides a practical survey of both the principles and practice of cryptography and network security.
Cover Title Page Copyright Contents Notation Preface About the Author Chapter 0 Reader’s Guide 0.1 Outline of This Book 0.2 A Roadmap for Readers and Instructors 0.3 Internet and Web Resources 0.4 Standards Chapter 1 Overview 1.1 Computer Security Concepts 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Network Security 1.7 Recommended Reading and Web Sites 1.8 Key Terms, Review Questions, and Problems PART ONE: SYMMETRIC CIPHERS Chapter 2 Classical Encryption Techniques 2.1 Symmetric Cipher Model 2.2 Substitution Techniques 2.3 Transposition Techniques 2.4 Rotor Machines 2.5 Steganography 2.6 Recommended Reading and Web Sites 2.7 Key Terms, Review Questions, and Problems Chapter 3 Block Ciphers and the Data Encryption Standard 3.1 Block Cipher Principles 3.2 The Data Encryption Standard (DES) 3.3 A DES Example 3.4 The Strength of DES 3.5 Differential and Linear Cryptanalysis 3.6 Block Cipher Design Principles 3.7 Recommended Reading and Web Site 3.8 Key Terms, Review Questions, and Problems Chapter 4 Basic Concepts in Number Theory and Finite Fields 4.1 Divisibility and the Division Algorithm 4.2 The Euclidean Algorithm 4.3 Modular Arithmetic 4.4 Groups, Rings, and Fields 4.5 Finite Fields of the Form GF(p) 4.6 Polynomial Arithmetic 4.7 Finite Fields of the Form GF(2[sup(n)]) 4.8 Recommended Reading and Web Sites 4.9 Key Terms, Review Questions, and Problems Appendix 4A: The Meaning of mod Chapter 5 Advanced Encryption Standard 5.1 The Origins AES 5.2 AES Structure 5.3 AES Round Functions 5.4 AES Key Expansion 5.5 An AES Example 5.6 AES Implementation 5.7 Recommended Reading and Web Sites 5.8 Key Terms, Review Questions, and Problems Appendix 5A: Polynomials with Coefficients in GF(2[sup(8)]) Appendix 5B: Simplified AES Chapter 6 Block Cipher Operation 6.1 Multiple Encryption and Triple DES 6.2 Electronic Codebook Mode 6.3 Cipher Block Chaining Mode 6.4 Cipher Feedback Mode 6.5 Output Feedback Mode 6.6 Counter Mode 6.7 XTS Mode for Block-Oriented Storage Devices 6.8 Recommended Web Site 6.9 Key Terms, Review Questions, and Problems Chapter 7 Pseudorandom Number Generation and Stream Ciphers 7.1 Principles of Pseudorandom Number Generation 7.2 Pseudorandom Number Generators 7.3 Pseudorandom Number Generation Using a Block Cipher 7.4 Stream Ciphers 7.5 RC4 7.6 True Random Numbers 7.7 Recommended Reading 7.8 Key Terms, Review Questions, and Problems PART TWO: ASYMMETRIC CIPHERS Chapter 8 More Number Theory 8.1 Prime Numbers¹ 8.2 Fermat’s and Euler’s Theorems 8.3 Testing for Primality 8.4 The Chinese Remainder Theorem 8.5 Discrete Logarithms 8.6 Recommended Reading and Web Sites 8.7 Key Terms, Review Questions, and Problems Chapter 9 Public-Key Cryptography and RSA 9.1 Principles of Public-Key Cryptosystems 9.2 The RSA Algorithm 9.3 Recommended Reading and Web Sites 9.4 Key Terms, Review Questions, and Problems Appendix 9A: Proof of the RSA Algorithm Appendix 9B: The Complexity of Algorithms Chapter 10 Other Public-Key Cryptosystems 10.1 Diffie-Hellman Key Exchange 10.2 ElGamal Cryptosystem 10.3 Elliptic Curve Arithmetic 10.4 Elliptic Curve Cryptography 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 10.6 Recommended Reading and Web Sites 10.7 Key Terms, Review Questions, and Problems PART THREE: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS Chapter 11 Cryptographic Hash Functions 11.1 Applications of Cryptographic Hash Functions 11.2 Two Simple Hash Functions 11.3 Requirements and Security 11.4 Hash Functions Based on Cipher Block Chaining 11.5 Secure Hash Algorithm (SHA) 11.6 SHA-3 11.7 Recommended Reading and Web Sites 11.8 Key Terms, Review Questions, and Problems Appendix 11A: Mathematical Basis of Birthday Attack Chapter 12 Message Authentication Codes 12.1 Message Authentication Requirements 12.2 Message Authentication Functions 12.3 Message Authentication Codes 12.4 Security of MACs 12.5 MACs Based on Hash Functions: HMAC 12.6 MACs Based on Block Ciphers: DAA and CMAC 12.7 Authenticated Encryption: CCM and GCM 12.8 Pseudorandom Number Generation Using Hash Functions and MACs 12.9 Recommended Reading 12.10 Key Terms, Review Questions, and Problems Chapter 13 Digital Signatures 13.1 Digital Signatures 13.2 ElGamal Digital Signature Scheme 13.3 Schnorr Digital Signature Scheme 13.4 Digital Signature Standard (DSS) 13.5 Recommended Reading and Web Sites 13.6 Key Terms, Review Questions, and Problems PART FOUR: MUTUAL TRUST Chapter 14 Key Management and Distribution 14.1 Symmetric Key Distribution Using Symmetric Encryption 14.2 Symmetric Key Distribution Using Asymmetric Encryption 14.3 Distribution of Public Keys 14.4 X.509 Certificates 14.5 Public Key Infrastructure 14.6 Recommended Reading and Web Sites 14.7 Key Terms, Review Questions, and Problems Chapter 15 User Authentication Protocols 15.1 Remote User Authentication Principles 15.2 Remote User Authentication Using Symmetric Encryption 15.3 Kerberos 15.4 Remote User Authentication Using Asymmetric Encryption 15.5 Federated Identity Management 15.6 Recommended Reading and Web Sites 15.7 Key Terms, Review Questions, and Problems Appendix 15A: Kerberos Encryption Techniques PART FIVE: NETWORK AND INTERNET SECURITY Chapter 16 Transport-Level Security 16.1 Web Security Issues 16.2 Secure Sockets Layer (SSL) 16.3 Transport Layer Security (TLS) 16.4 HTTPS 16.5 Secure Shell (SSH) 16.6 Recommended Reading and Web Sites 16.7 Key Terms, Review Questions, and Problems Chapter 17 Wireless Network Security 17.1 IEEE 802.11 Wireless LAN Overview 17.2 IEEE 802.11i Wireless LAN Security 17.3 Wireless Application Protocol Overview 17.4 Wireless Transport Layer Security 17.5 WAP End-to-End Security 17.6 Recommended Reading and Web Sites 17.7 Key Terms, Review Questions, and Problems Chapter 18 Electronic Mail Security 18.1 Pretty Good Privacy (PGP) 18.2 S/MIME 18.3 DomainKeys Identified Mail (DKIM) 18.4 Recommended Web Sites 18.5 Key Terms, Review Questions, and Problems Appendix 18A: Radix-64 Conversion Chapter 19 IP Security 19.1 IP Security Overview 19.2 IP Security Policy 19.3 Encapsulating Security Payload 19.4 Combining Security Associations 19.5 Internet Key Exchange 19.6 Cryptographic Suites 19.7 Recommended Reading and Web Sites 19.8 Key Terms, Review Questions, and Problems APPENDICES Appendix A: Projects for Teaching Cryptography and Network Security A.1 Sage Computer Algebra Projects A.2 Hacking Project A.3 Block Cipher Projects A.4 Laboratory Exercises A.5 Research Projects A.6 Programming Projects A.7 Practical Security Assessments A.8 Writing Assignments A.9 Reading/Report Assignments Appendix B: Sage Examples B.1 Chapter 2: Classical Encryption Techniques B.2 Chapter 3: Block Ciphers and the Data Encryption Standard B.3 Chapter 4: Basic Concepts in Number Theory and Finite Fields B.4 Chapter 5: Advanced Encryption Standard B.5 Chapter 6: Pseudorandom Number Generation and Stream Ciphers B.6 Chapter 8: Number Theory B.6 Chapter 9: Public-Key Cryptography and RSA B.7 Chapter 10: Other Public-Key Cryptosystems B.8 Chapter 11: Cryptographic Hash Functions B.9 Chapter 13: Digital Signatures References Index A B C D E F G H I K L M N O P Q R S T U V W X PART SIX: SYSTEM SECURITY Chapter 20 Intruders 20.1 Intruders 20.2 Intrusion Detection 20.3 Password Management 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Review Questions, and Problems Appendix 20A: The Base-Rate Fallacy Chapter 21 Malicious Software 21.1 Types of Malicious Software 21.2 Viruses 21.3 Virus Countermeasures 21.4 Worms 21.5 Distributed Denial of Service Attacks 21.6 Recommended Reading and Web Sites 21.7 Key Terms, Review Questions, and Problems Chapter 22 Firewalls 22.1 The Need for Firewalls 22.2 Firewall Characteristics 22.3 Types of Firewalls 22.4 Firewall Basing 22.5 Firewall Location and Configurations 22.6 Recommended Reading and Web Sites 22.7 Key Terms, Review Questions, and Problems PART SEVEN: LEGAL AND ETHICAL ISSUES Chapter 23 Legal and Ethical Issues 23.1 Cybercrime and Computer Crime 23.2 Intellectual Property 23.3 Privacy 23.4 Ethical Issues 23.5 Recommended Reading and Web Sites 23.6 Key Terms, Review Questions, and Problems Appendix C: Sage Problems C.1 Getting Started with Sage C.2 Programming with Sage C.3 Chapter 2: Classical Encryption Techniques C.4 Chapter 3: Block Ciphers and the Data Encryption Standard C.5 Chapter 4: Basic Concepts in Number Theory and Finite Fields C.6 Chapter 5: Advanced Encryption Standard C.7 Chapter 7: Pseudorandom Number Generation and Stream Ciphers C.8 Chapter 8: Number Theory C.9 Chapter 9: Public-Key Cryptography and RSA C.10 Chapter 10: Other Public-Key Cryptosystems C.11 Chapter 11: Cryptographic Hash Functions C.12 Chapter 13: Digital Signatures Glossary A B C D E F G H I K L M N O P R S T U V W Z