دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [8 ed.]
نویسندگان: William Stallings
سری:
ISBN (شابک) : 1292437480, 9781292437484
ناشر: Pearson
سال نشر: 2022
تعداد صفحات: 832
[833]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 23 Mb
در صورت تبدیل فایل کتاب Cryptography and Network Security: Principles and Practice, Global Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب رمزنگاری و امنیت شبکه: اصول و تمرین، نسخه جهانی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
برای دورههای رمزنگاری، امنیت رایانه، و امنیت شبکه.
همگام با حوزه سریع رمزنگاری و امنیت شبکه
Stalings' رمزگذاری و امنیت شبکه: اصول و تمرین دانش آموزان را با زمینه متقاعد کننده و در حال تحول رمزنگاری آشنا می کند. و امنیت شبکه در عصر ویروس ها و هکرها، استراق سمع الکترونیکی و کلاهبرداری الکترونیکی در مقیاس جهانی، امنیت در درجه اول اهمیت قرار دارد. هدف این کتاب ارائه یک بررسی عملی از اصول و عملکرد رمزنگاری و امنیت شبکه است. بخش اول کتاب به بررسی مسائل اساسی میپردازد که باید توسط یک قابلیت امنیت شبکه به آن پرداخته شود و یک آموزش و بررسی از رمزنگاری و فناوری امنیت شبکه ارائه میکند. بخش آخر کتاب به تمرین امنیت شبکه می پردازد و کاربردهای عملی را پوشش می دهد که برای تامین امنیت شبکه پیاده سازی شده و مورد استفاده قرار می گیرند.
For courses in Cryptography, Computer Security, and Network Security.
Keep pace with the fast-moving field of cryptography and network security
Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
Cover Title Page Copyright Dedication Contents Notation Preface About the Author Part One: Background Chapter 1. Information and Network Security Concepts 1.1 Cybersecurity, Information Security, and Network Security 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 Cryptography 1.7 Network Security 1.8 Trust and Trustworthiness 1.9 Standards 1.10 Key Terms, Review Questions, and Problems Chapter 2. Introduction to Number Theory 2.1 Divisibility and the Division Algorithm 2.2 The Euclidean Algorithm 2.3 Modular Arithmetic 2.4 Prime Numbers 2.5 Fermat’s and Euler’s Theorems 2.6 Testing for Primality 2.7 The Chinese Remainder Theorem 2.8 Discrete Logarithms 2.9 Key Terms, Review Questions, and Problems Appendix 2A The Meaning of Mod Part Two: Symmetric Ciphers Chapter 3. Classical Encryption Techniques 3.1 Symmetric Cipher Model 3.2 Substitution Techniques 3.3 Transposition Techniques 3.4 Key Terms, Review Questions, and Problems Chapter 4. Block Ciphers and the Data Encryption Standard 4.1 Traditional Block Cipher Structure 4.2 The Data Encryption Standard 4.3 A DES Example 4.4 The Strength of DES 4.5 Block Cipher Design Principles 4.6 Key Terms, Review Questions, and Problems Chapter 5. Finite Fields 5.1 Groups 5.2 Rings 5.3 Fields 5.4 Finite Fields of the Form GF(p) 5.5 Polynomial Arithmetic 5.6 Finite Fields of the Form GF(2n) 5.7 Key Terms, Review Questions, and Problems Chapter 6. Advanced Encryption Standard 6.1 Finite Field Arithmetic 6.2 AES Structure 6.3 AES Transformation Functions 6.4 AES Key Expansion 6.5 An AES Example 6.6 AES Implementation 6.7 Key Terms, Review Questions, and Problems Appendix 6A Polynomials with Coefficients in GF(28) Chapter 7. Block Cipher Operation 7.1 Multiple Encryption and Triple DES 7.2 Electronic CodeBook 7.3 Cipher Block Chaining Mode 7.4 Cipher Feedback Mode 7.5 Output Feedback Mode 7.6 Counter Mode 7.7 XTS-AES Mode for Block-Oriented Storage Devices 7.8 Format-Preserving Encryption 7.9 Key Terms, Review Questions, and Problems Chapter 8. Random Bit Generation and Stream Ciphers 8.1 Principles of Pseudorandom Number Generation 8.2 Pseudorandom Number Generators 8.3 Pseudorandom Number Generation Using a Block Cipher 8.4 Stream Ciphers 8.5 RC4 8.6 Stream Ciphers Using Feedback Shift Registers 8.7 True Random Number Generators 8.8 Key Terms, Review Questions, and Problems Part Three: Asymmetric Ciphers Chapter 9. Public-Key Cryptography and RSA 9.1 Principles of Public-Key Cryptosystems 9.2 The RSA Algorithm 9.3 Key Terms, Review Questions, and Problems Chapter 10. Other Public-Key Cryptosystems 10.1 Diffie–Hellman Key Exchange 10.2 Elgamal Cryptographic System 10.3 Elliptic Curve Arithmetic 10.4 Elliptic Curve Cryptography 10.5 Key Terms, Review Questions, and Problems Part Four: Cryptographic Data Integrity Algorithms Chapter 11. Cryptographic Hash Functions 11.1 Applications of Cryptographic Hash Functions 11.2 Two Simple Hash Functions 11.3 Requirements and Security 11.4 Secure Hash Algorithm (SHA) 11.5 SHA-3 11.6 Key Terms, Review Questions, and Problems Chapter 12. Message Authentication Codes 12.1 Message Authentication Requirements 12.2 Message Authentication Functions 12.3 Requirements for Message Authentication Codes 12.4 Security of MACs 12.5 MACs Based on Hash Functions: HMAC 12.6 MACs Based on Block Ciphers: DAA and CMAC 12.7 Authenticated Encryption: CCM and GCM 12.8 Key Wrapping 12.9 Pseudorandom Number Generation Using Hash Functions and MACs 12.10 Key Terms, Review Questions, and Problems Chapter 13. Digital Signatures 13.1 Digital Signatures 13.2 ElGamal Digital Signature Scheme 13.3 Schnorr Digital Signature Scheme 13.4 NIST Digital Signature Algorithm 13.5 Elliptic Curve Digital Signature Algorithm 13.6 RSA-PSS Digital Signature Algorithm 13.7 Key Terms, Review Questions, and Problems Chapter 14. Lightweight Cryptography and Post-Quantum Cryptography 14.1 Lightweight Cryptography Concepts 14.2 Lightweight Cryptographic Algorithms 14.3 Post-Quantum Cryptography Concepts 14.4 Post-Quantum Cryptographic Algorithms 14.5 Key Terms and Review Questions Part Five: Mutual Trust Chapter 15. Cryptographic Key Management and Distribution 15.1 Symmetric Key Distribution Using Symmetric Encryption 15.2 Symmetric Key Distribution Using Asymmetric Encryption 15.3 Distribution of Public Keys 15.4 X.509 Certificates 15.5 Public-Key Infrastructure 15.6 Key Terms, Review Questions, and Problems Chapter 16. User Authentication 16.1 Remote User-Authentication Principles 16.2 Remote User-Authentication Using Symmetric Encryption 16.3 Kerberos 16.4 Remote User-Authentication Using Asymmetric Encryption 16.5 Federated Identity Management 16.6 Key Terms, Review Questions, and Problems Part Six: Network And Internet Security Chapter 17. Transport-Level Security 17.1 Web Security Considerations 17.2 Transport Layer Security 17.3 HTTPS 17.4 Secure Shell (SSH) 17.5 Review Questions and Problems Chapter 18. Wireless Network Security 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless Lan Overview 18.4 IEEE 802.11i Wireless Lan Security 18.5 Key Terms, Review Questions, and Problems Chapter 19. Electronic Mail Security 19.1 Internet Mail Architecture 19.2 Email Formats 19.3 Email Threats and Comprehensive Email Security 19.4 S/MIME 19.5 DNSSEC 19.6 DNS-Based Authentication of Named Entities 19.7 Sender Policy Framework 19.8 DomainKeys Identified Mail 19.9 Domain-Based Message Authentication, Reporting, and Conformance 19.10 Key Terms, Review Questions, and Problems Chapter 20. IP Security 20.1 IP Security Overview 20.2 IP Security Policy 20.3 Encapsulating Security Payload 20.4 Combining Security Associations 20.5 Internet Key Exchange 20.6 Key Terms, Review Questions, and Problems Chapter 21. Network Endpoint Security 21.1 Firewalls 21.2 Intrusion Detection Systems 21.3 Malicious Software 21.4 Distributed Denial of Service Attacks 21.5 Key Terms, Review Questions, and Problems Chapter 22. Cloud Security 22.1 Cloud Computing 22.2 Cloud Security Concepts 22.3 Cloud Security Risks and Countermeasures 22.4 Cloud Security as a Service 22.5 An Open-Source Cloud Security Module 22.6 Key Terms and Review Questions Chapter 23. Internet of Things (IoT) Security 23.1 The Internet of Things 23.2 IoT Security Concepts and Objectives 23.3 An Open-Source IoT Security Module 23.4 Key Terms and Review Questions Appendix A. Basic Concepts from Linear Algebra A.1 Operations on Vectors and Matrices A.2 Linear Algebra Operations over Zn Appendix B. Measures of Secrecy and Security B.1 Conditional Probability B.2 Perfect Secrecy B.3 Information and Entropy B.4 Entropy and Secrecy B.5 Min-Entropy Appendix C. Data Encryption Standard Appendix D. Simplified AES D.1 Overview D.2 S-AES Encryption and Decryption D.3 Key Expansion D.4 The S-Box D.5 S-AES Structure Annex D.1 Arithmetic in GF(24) Annex D.2 The Mix Column Function Appendix E. Mathematical Basis of the Birthday Attack E.1 Related Problem E.2 The Birthday Paradox E.3 Useful Inequality E.4 The General Case of Duplications E.5 Overlap Between Two Sets Glossary References Index A B C D E F G H I K L M N O P Q R S T U V W X Z Acronyms