000 | 01900cam a22002654a 4500 | ||
---|---|---|---|
999 |
_c11538 _d11538 |
||
001 | 16431879 | ||
005 | 20200616100813.0 | ||
008 | 100824s2011 maua b 001 0 eng | ||
020 | _a9780136097044 | ||
020 | _a0136097049 | ||
020 | _a9788131761663 | ||
040 | _cDLC | ||
082 |
_a005.82 _bS7827 |
||
100 | 1 | _aStallings, William. | |
245 | 1 | 0 |
_aCryptography and network security : _bprinciples and practice / _cWilliam Stallings. |
250 | _a5th ed. | ||
260 |
_aNew Delhi : _bPearson, _c2013 |
||
300 |
_a743 p. : _bill. ; _c24 cm |
||
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aData encryption (Computer science) | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aComputer security. | |
942 | _cBK | ||
505 | 0 | _aPart One: Symmetric ciphers -- 2. Classical encryption techniques -- 3. Block ciphers and the data encryption standard -- 4. Basic concepts in number theory and finite fields -- 5. Advanced encryption standard -- 6. Block cipher operation -- 7. Pseudorandom number generation and stream ciphers -- Part Two: Asymmetric ciphers -- 8. More number theory -- 9. Public-key cryptography and RSA -- 10. Other public-key cryptosystems -- Part Three: Cryptographic data integrity algorithms -- 11. Cryptographic hash functions -- 12. Message authentication codes -- 13. Digital signatures -- Part Four: Mutual trust -- 14. Key management and distribution -- 15. User authentication protocols -- Part Five: Network and internet security -- 16. Transport-level security -- 17. Wireless network security -- 18. Electronic mail security -- 19. IP security -- Appendix A: Projects for teaching cryptography and network security -- Appendix B: Sage examples -- Online chapters -- Part Six: System security -- 20. Intruders -- 21. Malicious software -- 22. Firewalls -- Part Seven: Legal and ethical issues -- 23. Legal and ethical issues. |