MARC details
000 -LEADER |
fixed length control field |
03358cam a2200433 a 4500 |
001 - CONTROL NUMBER |
control field |
63126393 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250729100415.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
060123s2006 njua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2006276085 |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
National bibliography number |
GBA738207 |
Source |
bnb |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0131873164 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780131873162 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0132023229 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780132023221 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)63126393 |
Canceled/invalid control number |
(OCoLC)149436910 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
SINTU |
Language of cataloging |
eng |
Transcribing agency |
SINTU |
Modifying agency |
IXA |
-- |
BAKER |
-- |
DLC |
-- |
YDXCP |
-- |
UKM |
-- |
LVB |
-- |
BTCTA |
-- |
OCLCQ |
-- |
DEBBG |
-- |
OCL |
-- |
OCLCQ |
-- |
DEBSZ |
-- |
OCLCQ |
-- |
MNW |
-- |
TULIB |
-- |
SGB |
-- |
OCLCF |
-- |
OCLCQ |
-- |
OCLCA |
-- |
OCLCQ |
-- |
OCLCO |
-- |
OCLCQ |
-- |
OCLCA |
-- |
UKMGB |
-- |
OCLCA |
-- |
OCLCO |
-- |
OCL |
-- |
OCLCO |
-- |
OCLCQ |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.S713 2006 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Stallings, William |
245 10 - TITLE STATEMENT |
Title |
Cryptography and network security : |
Remainder of title |
principles and practices / |
Statement of responsibility, etc. |
William Stallings |
250 ## - EDITION STATEMENT |
Edition statement |
4th ed |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Upper Saddle River, N.J. : |
Name of publisher, distributor, etc. |
Pearson/Prentice Hall, |
Date of publication, distribution, etc. |
℗♭2006 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xvi, 680 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 663-672) and index |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
pt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security |
520 ## - SUMMARY, ETC. |
Summary, etc. |
In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Coding theory |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Public key cryptography |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cryptography |
General subdivision |
Computer networks |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer Security |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |
Suppress in OPAC |
No |