Cryptography and network security principles and practice / (Record no. 13575)

MARC details
000 -LEADER
fixed length control field 03229nam a2200229Ia 4500
003 - CONTROL NUMBER IDENTIFIER
control field NULRC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250520102718.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250520s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780133354690
040 ## - CATALOGING SOURCE
Transcribing agency NULRC
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK 5105.59 .S73 2014
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William
Relator term author
245 #0 - TITLE STATEMENT
Title Cryptography and network security principles and practice /
Statement of responsibility, etc. William Stallings
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, Massachusetts :
Name of publisher, distributor, etc. Pearson,
Date of publication, distribution, etc. c2014
300 ## - PHYSICAL DESCRIPTION
Extent xix, 731 pages :
Other physical details illustrations ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price amount USD116.86
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Overview -- Part One. Symmetric Ciphers -- Chapter 2. Classical Encryption Techniques -- Chapter 3. Block Ciphers and the Data Encryption Standard -- Chapter 4. Basic Concepts in Number Theory and Finite Fields -- Chapter 5. Advanced Encryption Standard -- Chapter 6. Block Cipher Operation -- Chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers -- Chapter 8. More Number Theory -- Chapter 9. Public-Key Cryptography and RSA -- Chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms -- Chapter 11. Cryptographic Hash Functions -- Chapter 12. Message Authentication Codes -- Chapter 13. Digital Signatures Part Four. Mutual Trust -- Chapter 14. Key Management and Distribution -- Chapter 15. User Authentication -- Part Five. Network And Internet Security -- Chapter 16. Network Access Control and Cloud Security -- Chapter 17. Transport-Level Security -- Chapter 18. Wireless Network Security -- Chapter 19. Electronic Mail Security -- Chapter 20. IP Security.
520 ## - SUMMARY, ETC.
Summary, etc. From the publisher. For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist. A practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. This text provides a practical survey of the principles and practice of cryptography and network security. Author William Stallings assumes readers are familiar with this field and have a reasonable mathematical background. The publication is akin to a concise university text
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element CODING THEORY
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     Gen. Ed. - CCIT LRC - Graduate Studies National University - Manila General Circulation 09/03/2015 Reaccessioned   GC TK 5105.59 .S73 2014 NULIB000011334 05/20/2025 c.1 05/20/2025 Books