Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Cryptography and Network Security: Principles and Practice / (Record no. 13620)

MARC details
000 -LEADER
fixed length control field 02692nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-NcFUE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260211111609.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251218s2023 ua|ad||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781292437484
040 ## - CATALOGING SOURCE
Language of cataloging eng
043 ## - GEOGRAPHIC AREA CODE
Geographic area code ua
082 #4 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number SWC
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Stallings, William
Dates associated with a name 1945-
9 (RLIN) 562
Relator term author.
245 1# - TITLE STATEMENT
Title Cryptography and Network Security: Principles and Practice /
Statement of responsibility, etc William Stallings.
250 ## - EDITION STATEMENT
Edition statement 8th Edition.
Remainder of edition statement Global Edition.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc UK:
Name of publisher, distributor, etc Pearson,
Date of publication, distribution, etc 2023.
300 ## - PHYSICAL DESCRIPTION
Extent 832 pages:
Other physical details color illustrations;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
501 ## - WITH NOTE
With note For courses in Cryptography, Computer Security, and Network Security.<br/><br/>Keep pace with the fast-moving field of cryptography and network security<br/><br/>Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Computer and Network Security Concepts<br/>Introduction to Number Theory<br/>Classical Encryption Techniques<br/>Block Ciphers and the Data Encryption Standard<br/>Finite Fields<br/>Advanced Encryption Standard<br/>Block Cipher Operation<br/>Random Bit Generation and Stream Ciphers<br/>Public-Key Cryptography and RSA<br/>Other Public-Key Cryptosystems<br/>Cryptographic Hash Functions<br/>Message Authentication Codes<br/>Digital Signatures<br/>Lightweight Cryptography and Post-Quantum Cryptography<br/>Key Management and Distribution<br/>User Authentication Protocols<br/>Transport-Level Security<br/>Wireless Network Security<br/>Electronic Mail Security<br/>IP Security<br/>Network Endpoint Security<br/>Cloud Security<br/>Internet of Things (IoT) Security<br/>Appendix A. Basic Concepts from Linear Algebra<br/>Appendix B. Measures of Security and Secrecy<br/>Appendix C. Data Encryption Standard (DES)<br/>Appendix D. Simplified AES<br/>Appendix E. Mathematical Basis of the Birthday Attack
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
9 (RLIN) 13076
General subdivision Computer science.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information security
General subdivision Computer science.
9 (RLIN) 34232
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Source of acquisition Acquisition method Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library 18/12/2025 Sphinx publishing Purchase   005.8 SWC 00017909 18/12/2025 C.1 18/12/2025 Books