000 01900cam a22002654a 4500
999 _c11538
_d11538
001 16431879
005 20200616100813.0
008 100824s2011 maua b 001 0 eng
020 _a9780136097044
020 _a0136097049
020 _a9788131761663
040 _cDLC
082 _a005.82
_bS7827
100 1 _aStallings, William.
245 1 0 _aCryptography and network security :
_bprinciples and practice /
_cWilliam Stallings.
250 _a5th ed.
260 _aNew Delhi :
_bPearson,
_c2013
300 _a743 p. :
_bill. ;
_c24 cm
650 0 _aComputer networks
_xSecurity measures.
650 0 _aData encryption (Computer science)
650 0 _aCoding theory.
650 0 _aComputer security.
942 _cBK
505 0 _aPart One: Symmetric ciphers -- 2. Classical encryption techniques -- 3. Block ciphers and the data encryption standard -- 4. Basic concepts in number theory and finite fields -- 5. Advanced encryption standard -- 6. Block cipher operation -- 7. Pseudorandom number generation and stream ciphers -- Part Two: Asymmetric ciphers -- 8. More number theory -- 9. Public-key cryptography and RSA -- 10. Other public-key cryptosystems -- Part Three: Cryptographic data integrity algorithms -- 11. Cryptographic hash functions -- 12. Message authentication codes -- 13. Digital signatures -- Part Four: Mutual trust -- 14. Key management and distribution -- 15. User authentication protocols -- Part Five: Network and internet security -- 16. Transport-level security -- 17. Wireless network security -- 18. Electronic mail security -- 19. IP security -- Appendix A: Projects for teaching cryptography and network security -- Appendix B: Sage examples -- Online chapters -- Part Six: System security -- 20. Intruders -- 21. Malicious software -- 22. Firewalls -- Part Seven: Legal and ethical issues -- 23. Legal and ethical issues.