Cryptography and network security principles and practice / (Record no. 13575)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03229nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520102718.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780133354690 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK 5105.59 .S73 2014 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stallings, William |
Relator term | author |
245 #0 - TITLE STATEMENT | |
Title | Cryptography and network security principles and practice / |
Statement of responsibility, etc. | William Stallings |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boston, Massachusetts : |
Name of publisher, distributor, etc. | Pearson, |
Date of publication, distribution, etc. | c2014 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 731 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD116.86 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Chapter 1. Overview -- Part One. Symmetric Ciphers -- Chapter 2. Classical Encryption Techniques -- Chapter 3. Block Ciphers and the Data Encryption Standard -- Chapter 4. Basic Concepts in Number Theory and Finite Fields -- Chapter 5. Advanced Encryption Standard -- Chapter 6. Block Cipher Operation -- Chapter 7. Pseudorandom Number Generation and Stream Ciphers -- Part Two. Assymetric Ciphers -- Chapter 8. More Number Theory -- Chapter 9. Public-Key Cryptography and RSA -- Chapter 10. Other Public-Key Cryptosystems -- Part Three. Cryptographic Data Integrity Algorithms -- Chapter 11. Cryptographic Hash Functions -- Chapter 12. Message Authentication Codes -- Chapter 13. Digital Signatures Part Four. Mutual Trust -- Chapter 14. Key Management and Distribution -- Chapter 15. User Authentication -- Part Five. Network And Internet Security -- Chapter 16. Network Access Control and Cloud Security -- Chapter 17. Transport-Level Security -- Chapter 18. Wireless Network Security -- Chapter 19. Electronic Mail Security -- Chapter 20. IP Security. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | From the publisher. For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a reference for a system engineer, programmer, system manager, network manager, product marketing personnel, or system support specialist. A practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. This text provides a practical survey of the principles and practice of cryptography and network security. Author William Stallings assumes readers are familiar with this field and have a reasonable mathematical background. The publication is akin to a concise university text |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | CODING THEORY |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Gen. Ed. - CCIT | LRC - Graduate Studies | National University - Manila | General Circulation | 09/03/2015 | Reaccessioned | GC TK 5105.59 .S73 2014 | NULIB000011334 | 05/20/2025 | c.1 | 05/20/2025 | Books |