| 000 | 01487cam a22002057a 4500 | ||
|---|---|---|---|
| 999 |
_c7059 _d7059 |
||
| 020 | _a0131873164 | ||
| 050 | 0 | 0 |
_aTK5105.59 _b.S713 |
| 100 | 1 | _aStallings, William. | |
| 245 | 1 | 0 |
_aCryptography and network security : _bprinciples and practice / _cWilliam Stallings. |
| 250 | _a4th ed. | ||
| 260 |
_aUpper Saddle River, N.J. : _bPearson/Prentice Hall, _cc2006. |
||
| 300 |
_axvi, 680 p. : _bill. ; _c24 cm. |
||
| 500 | _aIncludes index | ||
| 505 | _aC.1 - Introduction pt.1- Symmetric ciphers. C.2 Classical encryption techniques -- C.3 Block ciphers and the data encryption standard -- C.4 Finite fields -- C.5 Advanced encryption standard -- C.6 More on symmetric ciphers -- C. Confidentiality using symmetric encryption -- pt. 2: Public-key encryption and hash functions. C.8 Introduction to number theory -- C.9 Public-key cryptography and RSA -- C.10 Key management: other public-key cryptosystems -- C.11 Message authentication and hash functions -- C.12 Hash and MAC algorithms -- C.13 Digital signatures and authentication protocols -- pt. 3: Network security applications. C.14 Authentication applications -- C.15 Electronic mail security -- C.16 IP security -- C.17 Web security -- pt. 4: System security. C.18 Intruders -- C.19 Malicious software -- C.20 Firewalls - | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aData encryption (Computer science) | |
| 650 | 0 | _aCoding theory. | |
| 650 | 0 | _aComputer security. | |
| 942 | _cBK | ||