Sinopsis
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.
Content
- Introduction
- Symmetric Ciphers
- Finite Fields
- Advanced Encryption Standard
- More on Symmetric Ciphers
- Confidentiality Using Symmetric Encryption
- Introduction to Number Theory
- Public-Key Cryptography and RSA
- Key Management; Other Public-Key Cryptosystems
- Message Authentication and Hash Functions
- Hash and MAC Algorithms
- Digital Signatures and Authentication Protocols
- Network Security Applications
- Electronic Mail Security
- IP Security
- Web Security
- Intruders
- Malicious Software
- Firewalls
0 komentar:
Posting Komentar