National Open University Library

Cryptography and network security : (Record no. 13660)

MARC details
000 -LEADER
fixed length control field 02592cam a2200277 a 4500
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0131873164
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780131873162
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 0132023229
INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780132023221
DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
MAIN ENTRY--AUTHOR NAME
Personal name Stallings, William
TITLE STATEMENT
Title Cryptography and network security :
Remainder of title principles and practices /
Statement of responsibility, etc William Stallings
EDITION STATEMENT
Edition statement 4th ed
Copyright Date
Place of publication USA
Name of publisher Pearson Prentice Hill
Year of publication or production 2006
PHYSICAL DESCRIPTION
Number of Pages xvi, 680 pages :
Other physical details illustrations ;
FORMATTED CONTENTS NOTE
Formatted contents note pt. 1: Symmetric ciphers. Classical encryption techniques -- Block ciphers and the data encryption standard -- Finite fields -- Advanced encryption standard -- More on symmetric ciphers -- Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. Introduction to number theory -- Public-key cryptography and RSA -- Key management: other public-key cryptosystems -- Message authentication and hash functions -- Hash and MAC algorithms -- Digital signatures and authentication protocols -- pt. 3: Network security applications. Authentication applications -- Electronic mail security -- IP security -- Web security -- pt. 4: System security. Intruders -- Malicious software -- Firewalls --Appendix A: Standards and standards-setting organizations -- Appendix B: Projects for teaching cryptography and network security
SUMMARY, ETC.
Summary, etc In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. This solid, up-to-date tutorial is a comprehensive treatment of cryptography and network security is ideal for self-study. Explores the basic issues to be addressed by a network security capability through a tutorial and survey of cryptography and network security technology. Examines the practice of network security via practical applications that have been implemented and are in use today. Provides a simplified AES (Advanced Encryption Standard) that enables readers to grasp the essentials of AES more easily. Features block cipher modes of operation, including the CMAC mode for authentication and the CCM mode for authenticated encryption. Includes an expanded, updated treatment of intruders and malicious software. A useful reference for system engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer networks
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science)
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Coding theory
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer security
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Public key cryptography
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Cryptography
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Security
ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Books
Holdings
Permanent Location Current Location Date acquired Full call number Accession Number Koha item type
NOUN Wuse II Study Centre, Abuja NOUN Wuse II Study Centre, Abuja 10/25/2024 TK5105.S73 2006 0181408 Books

Powered by Koha

//