| 000 | 02692nam a22002777a 4500 | ||
|---|---|---|---|
| 003 | EG-NcFUE | ||
| 005 | 20260211111609.0 | ||
| 008 | 251218s2023 ua|ad||| |||| 00| 0 eng d | ||
| 020 | _a9781292437484 | ||
| 040 | _beng | ||
| 043 | _aua | ||
| 082 | 4 |
_223 _a005.8 _bSWC |
|
| 100 | 1 |
_aStallings, William _d1945- _9562 _eauthor. |
|
| 245 | 1 |
_aCryptography and Network Security: Principles and Practice / _cWilliam Stallings. |
|
| 250 |
_a8th Edition. _bGlobal Edition. |
||
| 264 | 1 |
_aUK: _bPearson, _c2023. |
|
| 300 |
_a832 pages: _bcolor illustrations; _c24 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 501 | _aFor courses in Cryptography, Computer Security, and Network Security. Keep pace with the fast-moving field of cryptography and network security Stallings’ Cryptography and Network Security: Principles and Practice introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. The first part of the book explores the basic issues to be addressed by a network security capability and provides a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security, covering practical applications that have been implemented and are in use to provide network security. | ||
| 505 | _aComputer and Network Security Concepts Introduction to Number Theory Classical Encryption Techniques Block Ciphers and the Data Encryption Standard Finite Fields Advanced Encryption Standard Block Cipher Operation Random Bit Generation and Stream Ciphers Public-Key Cryptography and RSA Other Public-Key Cryptosystems Cryptographic Hash Functions Message Authentication Codes Digital Signatures Lightweight Cryptography and Post-Quantum Cryptography Key Management and Distribution User Authentication Protocols Transport-Level Security Wireless Network Security Electronic Mail Security IP Security Network Endpoint Security Cloud Security Internet of Things (IoT) Security Appendix A. Basic Concepts from Linear Algebra Appendix B. Measures of Security and Secrecy Appendix C. Data Encryption Standard (DES) Appendix D. Simplified AES Appendix E. Mathematical Basis of the Birthday Attack | ||
| 650 | 1 | 4 |
_aComputer security. _913076 _xComputer science. |
| 650 | 1 | 4 |
_aInformation security _xComputer science. _934232 |
| 942 |
_2ddc _cBK |
||
| 999 |
_c13620 _d13620 |
||