000 03358cam a2200433 a 4500
001 63126393
003 OCoLC
005 20250729100415.0
008 060123s2006 njua b 001 0 eng d
010 _a2006276085
015 _aGBA738207
_2bnb
020 _a0131873164
020 _a9780131873162
020 _a0132023229
020 _a9780132023221
035 _a(OCoLC)63126393
_z(OCoLC)149436910
040 _aSINTU
_beng
_cSINTU
_dIXA
_dBAKER
_dDLC
_dYDXCP
_dUKM
_dLVB
_dBTCTA
_dOCLCQ
_dDEBBG
_dOCL
_dOCLCQ
_dDEBSZ
_dOCLCQ
_dMNW
_dTULIB
_dSGB
_dOCLCF
_dOCLCQ
_dOCLCA
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCA
_dUKMGB
_dOCLCA
_dOCLCO
_dOCL
_dOCLCO
_dOCLCQ
050 0 0 _aTK5105.59
_b.S713 2006
082 0 4 _a005.8
_222
100 1 _aStallings, William
245 1 0 _aCryptography and network security :
_bprinciples and practices /
_cWilliam Stallings
250 _a4th ed
260 _aUpper Saddle River, N.J. :
_bPearson/Prentice Hall,
_c℗♭2006
300 _axvi, 680 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references (pages 663-672) and index
505 0 _apt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security
520 _aIn this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists
650 0 _aComputer networks
_xSecurity measures
650 0 _aData encryption (Computer science)
650 0 _aCoding theory
650 0 _aComputer security
650 0 _aPublic key cryptography
650 0 _aCryptography
_xComputer networks
650 2 _aComputer Security
942 _2lcc
_cBOOKS
_n0
999 _c1909
_d1909