Cryptography and Network Security: (Record no. 40599)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03165nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | CUTN |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231202105613.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231202b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789332585225 |
041 ## - LANGUAGE CODE | |
Language | English |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 23 |
Classification number | 005.82 |
Item number | STA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Stallings, William |
245 ## - TITLE STATEMENT | |
Title | Cryptography and Network Security: |
Remainder of title | Principles and Practice/ |
250 ## - EDITION STATEMENT | |
Edition statement | 7th Edition |
260 T# - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc | Noida : |
Name of publisher, distributor, etc | Pearson Education, |
Date of publication, distribution, etc | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 766 p. : |
500 ## - GENERAL NOTE | |
General note | Pearson brings to you the revised edition of Cryptography and Network Security by Stallings. In an<br/>age of viruses and hackers, electronic eavesping, and electronic fraud on a global scale, security<br/>is paramount. The purpose of this book is to provide a practical survey of both the principles and<br/>practice of cryptography and network security.<br/>In the first part of the book, the basic issues to be addressed by network security capability are<br/>explored by providing a tutorial and survey of cryptography and network security technology. The<br/>latter part of the book deals with the practice of network security—practical applications that have<br/>been implemented and are in use to provide network security." |
500 ## - GENERAL NOTE | |
General note | 1. Throughout the book, refinements and revisions improve pedagogy and user-friendliness, in addition to substantive changes.<br/><br/><br/>2. Comprehensive, up-to-date surveys of cryptographic algorithms provide an understanding of the important algorithms and allow students to assess their relative strengths and weaknesses.<br/><br/><br/>3. New sections on fundamental security design principles, attack surfaces and attack trees.<br/><br/><br/>4. Chapter on Email Security has been completely rewritten to provide a comprehensive and upto-date discussion of the topic.<br/><br/><br/>5. Discussion on user authentication model, cloud security and Transport Layer Security has been thoroughly reorganized and expanded in the new edition to reflect recent developments. |
505 ## - FORMATTED CONTENTS NOTE | |
Contents | TABLE OF CONTENTS |
Title | Chapter 1 Computer and Network Security Concepts<br/><br/><br/> Chapter 2 Introduction to Number Theory<br/><br/><br/>Chapter 3 Classical Encryption Techniques<br/><br/><br/>Chapter 4 Block Ciphers and the Data Encryption Standard<br/><br/><br/>Chapter 5 Finite Fields<br/><br/><br/>Chapter 6 Advanced Encryption Standard<br/><br/><br/>Chapter 7 Block Cipher Operation<br/><br/><br/>Chapter 8 Random Bit Generation and Stream Ciphers<br/><br/><br/>Chapter 9 Public-Key Cryptography and RSA<br/><br/><br/>Chapter 10 Other Public-Key Cryptosystems<br/><br/><br/>Chapter 11 Cryptographic Hash Functions<br/><br/><br/>Chapter 12 Message Authentication Codes<br/><br/><br/>Chapter 13 Digital Signatures<br/><br/><br/>Chapter 14 Key Management and Distribution<br/><br/><br/>Chapter 15 User Authentication Protocols<br/><br/><br/>Chapter 16 Network Access Control and Cloud Security<br/><br/><br/>Chapter 17 Transport-Level Security<br/><br/><br/>Chapter 18 Wireless Network Security<br/><br/><br/>Chapter 19 Electronic Mail Security<br/><br/><br/>Chapter 20 IP Security<br/> |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Chiffrement (Informatique) Coding theory Computer Security Computer networks Security measures Computer security Data encryption (Computer science) Réseaux d'ordinateurs Sécurité Mesures Sécurité informatique |
690 ## - LOCAL SUBJECT ADDED ENTRY--TOPICAL TERM (OCLC, RLIN) | |
Department Name | COMPUTER SCIENCE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | General Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Location | Shelving location | Date of Cataloging | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Non-fiction | CUTN Central Library | CUTN Central Library | Generalia | 02/12/2023 | 005.8 STA | 47800 | 02/12/2023 | 02/12/2023 | General Books |