| 000 | 01941cam a2200337 i 4500 | ||
|---|---|---|---|
| 999 |
_c4265 _d4265 |
||
| 001 | 63126393 | ||
| 005 | 20190509092039.0 | ||
| 008 | 060123s2006 njua b 001 0 eng d | ||
| 020 | _a0131873164 | ||
| 020 | _a0132023229 | ||
| 020 | _a9780132023221 | ||
| 040 |
_aSINTU _cSINTU _dIXA _dBAKER _erda |
||
| 082 | 0 | 4 |
_221 _a005.8 _bS.W.C |
| 100 | 1 |
_aStallings, William, _eauthor |
|
| 245 | 1 | 0 |
_aCryptography and network security : _bprinciples and practice / _cWilliam Stallings. |
| 250 | _afourth edition | ||
| 264 | 1 |
_aUpper Saddle River, N.J. : _bPearson/Prentice Hall, _c[2006] |
|
| 264 | 4 | _c©2006 | |
| 300 |
_axvi, 680 pages : _billustrations ; _c24 cm |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 504 | _aIncludes bibliographical references (p. 663-672) and index. | ||
| 505 | 0 | _a Symmetric ciphers: Classical encryption techniques; Block ciphers and the data encryption standard; Finite fields; Advanced encryption standard; More on symmetric ciphers; Confidentiality using symmetric encryption -- Public-key encryption and hash functions: Introduction to number theory; Public-key cryptography and RSA; Key management, other public-key cryptosystems; Message authentication and hash functions; Hash and MAC algorithms; Digital signatures and authentication protocols -- Network security applications: Authentication applications; Electronic mail security; IP security; Web security -- System security: Intruders; Malicious software; Firewalls -- Appendices: Standards and standards-setting organizations; Projects for teaching cryptography and network security -- Glossary. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aData encryption (Computer science) _916940 |
|
| 650 | 0 |
_aCoding theory. _916941 |
|
| 650 | 0 | _aComputer security. | |
| 856 |
_3Abstract _uhttp://repository.fue.edu.eg/xmlui/handle/123456789/3386 |
||
| 942 |
_cBK _2ddc |
||