Cryptography and Network Security: (Record no. 40599)

MARC details
000 -LEADER
fixed length control field 03165nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231202105613.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231202b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789332585225
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.82
Item number STA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William
245 ## - TITLE STATEMENT
Title Cryptography and Network Security:
Remainder of title Principles and Practice/
250 ## - EDITION STATEMENT
Edition statement 7th Edition
260 T# - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Noida :
Name of publisher, distributor, etc Pearson Education,
Date of publication, distribution, etc 2023.
300 ## - PHYSICAL DESCRIPTION
Extent 766 p. :
500 ## - GENERAL NOTE
General note Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an<br/>age of viruses and hackers, electronic eavesping, and electronic fraud on a global scale, security<br/>is paramount. The purpose of this book is to provide a practical survey of both the principles and<br/>practice of cryptography and network security.<br/>In the first part of the book, the basic issues to be addressed by network security capability are<br/>explored by providing a tutorial and survey of cryptography and network security technology. The<br/>latter part of the book deals with the practice of network security—practical applications that have<br/>been implemented and are in use to provide network security."
500 ## - GENERAL NOTE
General note 1. Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.<br/><br/><br/>2. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important algorithms and allow students to assess their relative strengths and weaknesses.<br/><br/><br/>3. New sections on fundamental security design principles, attack surfaces and attack trees.<br/><br/><br/>4. Chapter on Email Security has been completely rewritten to provide a comprehensive and upto-date discussion of the topic.<br/><br/><br/>5. Discussion on user authentication model, cloud security and Transport Layer Security has been thoroughly reorganized and expanded in the new edition to reflect recent developments.
505 ## - FORMATTED CONTENTS NOTE
Contents TABLE OF CONTENTS
Title Chapter 1 Computer and Network Security Concepts<br/><br/><br/> Chapter 2 Introduction to Number Theory<br/><br/><br/>Chapter 3 Classical Encryption Techniques<br/><br/><br/>Chapter 4 Block Ciphers and the Data Encryption Standard<br/><br/><br/>Chapter 5 Finite Fields<br/><br/><br/>Chapter 6 Advanced Encryption Standard<br/><br/><br/>Chapter 7 Block Cipher Operation<br/><br/><br/>Chapter 8 Random Bit Generation and Stream Ciphers<br/><br/><br/>Chapter 9 Public-Key Cryptography and RSA<br/><br/><br/>Chapter 10 Other Public-Key Cryptosystems<br/><br/><br/>Chapter 11 Cryptographic Hash Functions<br/><br/><br/>Chapter 12 Message Authentication Codes<br/><br/><br/>Chapter 13 Digital Signatures<br/><br/><br/>Chapter 14 Key Management and Distribution<br/><br/><br/>Chapter 15 User Authentication Protocols<br/><br/><br/>Chapter 16 Network Access Control and Cloud Security<br/><br/><br/>Chapter 17 Transport-Level Security<br/><br/><br/>Chapter 18 Wireless Network Security<br/><br/><br/>Chapter 19 Electronic Mail Security<br/><br/><br/>Chapter 20 IP Security<br/>
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Chiffrement (Informatique) Coding theory Computer Security Computer networks Security measures Computer security Data encryption (Computer science) Réseaux d'ordinateurs Sécurité Mesures Sécurité informatique
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN)
Department Name COMPUTER SCIENCE
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 02/12/2023   005.8 STA 47800 02/12/2023 02/12/2023 General Books

Powered by Koha