000 | 02815cam a2200373 i 4500 | ||
---|---|---|---|
001 | 948671000 | ||
003 | OCoLC | ||
005 | 20250624120615.0 | ||
008 | 160502t20172017maua b 001 0 eng | ||
010 | _a2016020709 | ||
020 | _a9780134527338 | ||
020 | _a013452733X | ||
040 |
_aDLC _beng _erda _cDLC _dOCLCF _dYDX _dHF9 _dBTCTA _dBDX _dYDXCP _dKSU _dUtOrBLW |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.59 _b.S725 2017 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aStallings, William, _eauthor. _0http://id.loc.gov/authorities/names/n82162575 |
|
245 | 1 | 0 |
_aNetwork security essentials : _bapplications and standards / _cWilliam Stallings |
250 | _aSixth edition | ||
264 | 1 |
_aBoston : _bPearson, _c[2017] |
|
264 | 4 | _c℗♭2017 | |
300 |
_axvi, 445 pages : _billustrations ; _c23 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aInclude permanent access to student and instructor resources on the author website | ||
500 | _aIncludes six months of access to first user to the companion website, which includes three chapters of the book in PDF format, online appendices, homework problems and solutions, key papers, and supporting documents | ||
504 | _aIncludes bibliographical references (pages 426-431) and index | ||
505 | 0 | _aPt. 1. Cryptography -- Symmetric encryption and message confidentiality -- Public-key cryptography and message authentication -- pt. 2. Network security applications -- Key distribution and user authentication -- Network access control and cloud security -- Transport-level security -- Wireless network security -- Electronic mail security -- IP security -- pt. III. System security -- Malicious software -- Intruders -- Firewalls | |
520 |
_aNetwork Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks. The Sixth Edition covers the expanding developments in the cryptography and network security disciplines, giving students a practical survey of applications and standards. The text places emphasis on applications widely used for Internet and corporate networks, as well as extensively deployed internet standards. -- _cProvided by publisher's website |
||
650 | 0 |
_aComputer networks _xSecurity measures. _0http://id.loc.gov/authorities/subjects/sh94001277 |
|
650 | 0 |
_aComputer security. _0http://id.loc.gov/authorities/subjects/sh90001862 |
|
942 |
_2lcc _cBOOKS _n0 |
||
999 |
_c1765 _d1765 |