Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Amazon cover image
Image from Amazon.com
Syndetics cover image
Image from Syndetics
Image from Google Jackets
Image from OpenLibrary

Introduction to cryptography and network security / Behrouz A. Forouzan.

By: Material type: TextTextSeries: McGraw-Hill Forouzan networking seriesPublication details: Boston : McGraw-Hill Higher Education, c2008.Description: xxvi, 721 p. : ill. ; 24 cmISBN:
  • 9780072870220
  • 0072870222
  • 9780073327532 (set)
  • 0073327530 (set)
Subject(s): LOC classification:
  • TK5105.59 .F67 2008
Online resources:
Contents:
Mathematics of cryptography -- Traditional symmetric-key ciphers -- Mathematics of cryptography --Introduction to modern symmetric-key ciphers --Data encryption standard -- Advanced encryption standard -- Encipherment using modern symmetric-key ciphers -- Mathematics of cryptography -- Asymmetric-key cryptography -- Message integrity and message authentication -- Cryptographic hash functions --Digital signature -- Entity authentication -- Key management -- Security at the transport layer: SSL and TLS -- Security at the network layer: IPSec .
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Zetech Library - Pioneer General Stacks Non-fiction TK5105.59 .F67 2008 (Browse shelf(Opens below)) C1 Available Z001556
Books Books Zetech Library - TRC General Stacks Non-fiction TK5105.59 .F67 2008 (Browse shelf(Opens below)) C2 Available Z001706

Includes bibliographical references (p. 707-708) and index.

Mathematics of cryptography -- Traditional symmetric-key ciphers -- Mathematics of cryptography --Introduction to modern symmetric-key ciphers --Data encryption standard -- Advanced encryption standard -- Encipherment using modern symmetric-key ciphers -- Mathematics of cryptography -- Asymmetric-key cryptography -- Message integrity and message authentication -- Cryptographic hash functions --Digital signature -- Entity authentication -- Key management -- Security at the transport layer: SSL and TLS -- Security at the network layer: IPSec .

There are no comments on this title.

to post a comment.