Cryptography and network security : principles and practice (Record no. 13100)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01676cam a2200241 a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 0130914290 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788120323858 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9788178089027 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 |
Item number | STA |
100 1# - MAIN ENTRY--AUTHOR NAME | |
Personal name | Stallings, William. |
245 10 - TITLE STATEMENT | |
Title | Cryptography and network security : principles and practice |
250 ## - EDITION STATEMENT | |
Edition statement | 3rd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication | New Delhi : |
Name of publisher | Prentice Hall, |
-- | Pearson Education, |
Year of publication | 2003. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | xiv, 681 p. : |
Other physical details | ill. ; |
500 ## - GENERAL NOTE | |
General note | Includes index |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Overview --<br/>Classical encryption techniques --<br/>Block ciphers and the data encryption standard --<br/>Introduction to finite fields --<br/>Advanced encryption standard --<br/>Contemporary symmetric ciphers --<br/>Confidentiality using symmetric encryption --<br/>Introduction to number theory --<br/>Public-key cryptography and RSA --<br/>Key management; other public-key cryptosystems --<br/>Message authentication and hash functions --<br/>Hash algorithms --<br/>Digital signatures and authentication protocols --<br/>Authentication applications --<br/>Electronic mail security --<br/>IP security --<br/>Web security --<br/>Intruders --<br/>Malicious software --<br/>Firewalls. |
520 ## - SUMMARY, ETC. | |
Summary, etc | "Stallings has provided a state-of-the-art text covering the basic issues and principles and surveying cryptographic and network security techniques. The later part of the book deals with the real-world practice of network security: practical applications that have been implemented and are in use to provide network security. This book is intended for both an academic and a professional audience |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer networks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Data encryption (Computer science) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Coding theory. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical Term | Computer security. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Lending Books |
Collection code | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Full call number | Accession Number | Koha item type |
---|---|---|---|---|---|---|---|---|---|
Reference | Main Library | Main Library | Stacks | 18/04/2005 | Purchased | 811.25 | 005.82 STA | 009770 | Lending Books |
Reference | Main Library | Main Library | Stacks | 06/12/2004 | Purchased | 811.25 | 005.82 STA | 009237 | Lending Books |
Reference | Main Library | Main Library | Stacks | 27/01/2004 | Purchased | 400.00 | 005.82 STA | 008297 | Lending Books |