Экстернат |
ДОУ 3Р1, 3Р2:
Управление ключами шифрования и безопасность сети
: Литература по курсу
Опубликован: 19.01.2010 | Уровень: специалист | Доступ: свободно
- 1.Invitation to CryptologyUpper Saddle River.NJ: Prentice Hall, 2002
- 2.Cryptography with Java AppletsSudbury, MA: Jones and Bartlett, 2003
- 3.Computer SecurityReading, MA: Addison-Wesley, 2005
- 4.Algebraic Codes for Data TransmissionCambridge:Cambridge University Press, 2003
- 5.Computational Number Theory.EmervilleCA: Key College, 2000
- 6.The Mathematics of CiphersNatick, MA: A. K.Peters, 1999
- 7.Abstract AlgebraHoboken, NJ: John Wiley & Sons, 2004
- 8.PSec. Upper Saddle RiverNJ:Prentice Hall, 2003
- 9.Modern AlgebraHoboken, NJ: John Wiley & Sons,2005
- 10.Elliptic Curves and Their Applications to CryptographyNorwell, MA: Kluver Academic, 1999
- 11.TCP/IP Protocol SuiteNew York: McGraw-Hill,2006
- 12.Data Communication and NetworkingNew York:McGraw-Hill, 2007
- 13.Demystifying the IPSec PuzzleNorwood, MA:Artech House, 2001
- 14.Making, Breaking CodesUpper Saddle River, NJ:Prentice Hall, 2001
- 15.The Code breakers: The Story of Secret WritingNew York: Scribner,1996
- 16.Network SecurityUpper Saddle River, NJ: Prentice Hall, 2001
- 17.Elementary Linear AlgebraBoston: Houghton Mifflin, 2004
- 18.Modern CryptographyUpper Saddle River, NJ: Prentice Hall, 2004
- 19.Handbook of Applied CryptographyNew York: CRC Press, 1997
- 20.Fundamentals of Computer SecurityBerlin: Springer, 2003
- 21.SSL and TLSReading, MA: Addison-Wesley, 2001
- 22.Internet SecurityHoboken, NJ: John Wiley & Sons,2003
- 23.Elementary Number TheoryReading, MA: Addison-Wesley, 2006
- 24.Data Privacy and SecurityBerlin: Springer, 2003
- 25.Applied CryptographyReading, MA: Addison-Wesley,1996
- 26.Cryptography and Network SecurityUpper Saddle River, NJ: Prentice Hall, 2006
- 27.Cryptography: Theory and PracticeNew York: Chapman & Hall/CRC, 2006
- 28.SSL and TLS EssentialsNew York: John Wiley & Sons, 2000
- 29.Introduction to Cryptography and Coding TheoryUpper Saddle River, NJ: Prentice Hall, 2006
- 30.A Classical Introduction to CryptographyNew York: Springer, 2006