000 | 03358cam a2200433 a 4500 | ||
---|---|---|---|
001 | 63126393 | ||
003 | OCoLC | ||
005 | 20250729100415.0 | ||
008 | 060123s2006 njua b 001 0 eng d | ||
010 | _a2006276085 | ||
015 |
_aGBA738207 _2bnb |
||
020 | _a0131873164 | ||
020 | _a9780131873162 | ||
020 | _a0132023229 | ||
020 | _a9780132023221 | ||
035 |
_a(OCoLC)63126393 _z(OCoLC)149436910 |
||
040 |
_aSINTU _beng _cSINTU _dIXA _dBAKER _dDLC _dYDXCP _dUKM _dLVB _dBTCTA _dOCLCQ _dDEBBG _dOCL _dOCLCQ _dDEBSZ _dOCLCQ _dMNW _dTULIB _dSGB _dOCLCF _dOCLCQ _dOCLCA _dOCLCQ _dOCLCO _dOCLCQ _dOCLCA _dUKMGB _dOCLCA _dOCLCO _dOCL _dOCLCO _dOCLCQ |
||
050 | 0 | 0 |
_aTK5105.59 _b.S713 2006 |
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 | _aStallings, William | |
245 | 1 | 0 |
_aCryptography and network security : _bprinciples and practices / _cWilliam Stallings |
250 | _a4th ed | ||
260 |
_aUpper Saddle River, N.J. : _bPearson/Prentice Hall, _c℗♭2006 |
||
300 |
_axvi, 680 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 663-672) and index | ||
505 | 0 | _apt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security | |
520 | _aIn this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists | ||
650 | 0 |
_aComputer networks _xSecurity measures |
|
650 | 0 | _aData encryption (Computer science) | |
650 | 0 | _aCoding theory | |
650 | 0 | _aComputer security | |
650 | 0 | _aPublic key cryptography | |
650 | 0 |
_aCryptography _xComputer networks |
|
650 | 2 | _aComputer Security | |
942 |
_2lcc _cBOOKS _n0 |
||
999 |
_c1909 _d1909 |